Security+ 1.2 — Summarize fundamental security concepts.

Status: done

Exam objective

Summarize fundamental security concepts.

Official CompTIA scope (SY0-701 v5.0)

Open PDF on page 4


My notes

The CIA Triad (foundation of security)

The foundational model of information security. Every security decision maps back to one or more of these three goals.

Confidentiality

Definition: Protection of information from unauthorized access and disclosure. Only authorized people can VIEW the data.

Why it matters: Protect personal privacy (PII, PHI), maintain business advantage (trade secrets), achieve regulatory compliance (GDPR, HIPAA, PCI-DSS).

Methods to ensure confidentiality:

Exam example: Encrypting laptop hard drives = Confidentiality


Integrity

Definition: Data remains accurate and unchanged unless modified by authorized personnel. Data is TRUSTWORTHY and UNALTERED.

Why it matters: Ensure data accuracy (financial records, medical data), maintain trust (customers, partners), ensure system operability (corrupted configs break systems).

Methods to ensure integrity:

Exam example: Using SHA-256 hash to verify downloaded file wasn’t tampered with = Integrity


Availability

Definition: Information and resources are accessible when needed by authorized users. System UPTIME and ACCESS.

Why it matters: Business continuity (24/7 operations), customer trust (e-commerce availability), reputation (downtime = lost revenue).

Key concept — REDUNDANCY (duplication of critical components to enhance reliability):

Availability metrics:

Exam example: Implementing RAID 5 for server storage = Availability


CIA Triad summary

Pillar Goal Threat example Control example Key method
Confidentiality Only authorized parties can access the data Data breach, shoulder surfing, eavesdropping Encryption, access controls, data masking Encryption
Integrity Data is accurate, complete, and unaltered Man-in-the-middle, data tampering Hashing, digital signatures, version control Hashing
Availability Systems and data are accessible when needed DDoS, ransomware, hardware failure Redundancy, backups, load balancing Redundancy

Memory aid

Can’t see it = Confidentiality (encryption). Is it accurate? = Integrity (hashing). Always available = Availability (redundancy).


Non-repudiation

Definition: Proof that someone performed an action — they cannot deny it.

How it works:

  1. User creates/sends message
  2. Hash the message
  3. Encrypt hash with user’s PRIVATE key = digital signature
  4. Recipient decrypts with user’s PUBLIC key
  5. Proves sender identity (only they have that private key)

Technologies:

Exam focus: Non-repudiation is most commonly associated with digital signatures and PKI. It is distinct from authentication — authentication proves who you are now; non-repudiation proves you did something in the past and cannot deny it.

Exam keyword: “Cannot deny” = Non-repudiation


The CIA + Non-repudiation + Authentication = CIANA Pentagon


Authentication, Authorization, and Accounting (AAA)

Authentication

Definition: Verifying identity — proving you are who you claim to be.

The five authentication factors:

Factor Type Examples Weakness
Something you know Knowledge Passwords, PINs, passphrases, security questions Can be forgotten, shared, stolen
Something you have Possession Smart cards, key fobs, mobile device (SMS codes), hardware tokens (RSA SecurID) Can be lost, stolen
Something you are Inherence Fingerprints, iris scans, facial recognition, voice recognition Can’t be changed if compromised
Something you do Action Typing patterns (keystroke dynamics), signature dynamics, gait analysis Behavioral patterns can change
Somewhere you are Location GPS coordinates, IP geolocation, network location Can be spoofed

Multi-Factor Authentication (MFA):

Exam tip: Count the TYPES of factors, not the NUMBER of items.

Memory aid — KHAIL

Knowledge, Have, Are, I do, Location


Authorization

Definition: Determining what an authenticated user can ACCESS or DO. Happens AFTER authentication.

Key principles:

Authorization models:


Accounting

Also called: Auditing

Definition: Tracking and recording user activities.

What it provides:

  1. Audit trail — Chronological record of who did what, when, where
  2. Regulatory compliance — Maintain activity records (SOX, HIPAA)
  3. Forensic analysis — Understand security incidents
  4. Resource optimization — Track usage for capacity planning
  5. User accountability — Deter misuse through monitoring

Technologies used:


AAA summary

Component Question it answers Examples
Authentication “Who are you?” Username/password, biometrics, smart cards, MFA
Authorization “What are you allowed to do?” ACLs, RBAC, file permissions, security groups
Accounting “What did you do?” Log files, SIEM events, session recordings, audit trails

AAA is a sequence: Authenticate first, THEN authorize, THEN account.

Protocols that implement AAA:

Memory aid

“Who, What, When” — Authentication: WHO are you? Authorization: WHAT can you access? Accounting: WHEN did you do it?


Gap analysis

Definition: Evaluating differences between CURRENT state and DESIRED state to identify security gaps and prioritize improvements.

Process steps:

  1. Define scope — What are we analyzing? (entire infrastructure, specific system, compliance requirement)
  2. Assess current state — Document existing security controls, policies, configurations
  3. Identify desired state — Based on standards, regulations, best practices (NIST CSF, ISO 27001, CIS Controls)
  4. Identify gaps — Where do we fall short?
  5. Prioritize — Risk-based prioritization
  6. Develop plan — Create remediation roadmap

Types of gap analysis:

Output: Plan of Action and Milestones (POA&M) — Specific measures to address each vulnerability with resource allocation, timelines, and milestones.

Exam scenario: “Organization wants to achieve SOX compliance. What should they do first?” Answer: Conduct gap analysis to identify compliance gaps.


Zero Trust

Core principle: “Never trust, always verify”

Control plane (policy layer)

Makes decisions about WHO gets access to WHAT.

Element Description Example
Adaptive identity Real-time validation based on context (behavior, device, location, time, risk score) Login from new country triggers extra verification
Threat scope reduction Minimize attack surface, limit access to only what’s needed, reduce “blast radius” of breach Microsegmentation
Policy-driven access control Access based on roles and responsibilities, dynamic policies, continuous evaluation Contextual access rules
Secured zones Isolated network segments for sensitive data, separate high-value assets Network microsegmentation

Components:


Data plane (enforcement layer)

WHERE access decisions are enforced.


Zero Trust workflow

  1. Subject requests access to resource
  2. Request goes to Policy Engine
  3. Policy Engine evaluates: Identity verified? Device trusted? Location authorized? Time appropriate? Risk score acceptable?
  4. Policy Administrator makes decision
  5. Policy Enforcement Point grants/denies access
  6. Continuous monitoring and re-evaluation

Exam tip: Know difference between Control Plane (decisions) and Data Plane (enforcement). PEP is part of the DATA plane, not the control plane — this is a common exam trap.

Memory aid

“Never trust, always verify, enforce everywhere”


Physical security

Physical security controls protect facilities, hardware, and people.


Deception and disruption technology

Security tools designed to mislead, detect, or delay attackers.

Technology Description Purpose
Honeypot A single decoy system that appears to be a legitimate target Detect and study attacker behavior
Honeynet A network of honeypots simulating an entire environment Lure attackers into a monitored fake network
Honeyfile A decoy file (e.g., “passwords.xlsx”) placed to detect unauthorized access Detect insider threats or lateral movement
Honeytoken A fake data element (fake credentials, fake database record, fake API key) that triggers an alert when used Detect credential theft or data exfiltration

Key distinction: Honeypots are systems; honeytokens are data. A honeytoken could be a fake email address inserted into a database — if spam arrives at that address, the database has been compromised.

DNS sinkhole — A DNS server that returns false results for known malicious domains, redirecting traffic to a safe location (or nowhere). Used to disrupt malware command-and-control (C2) communication.


Common exam traps

Trap: Confusing integrity and confidentiality.

Trap: Multi-factor misconceptions.

Trap: Authentication vs. authorization order.

Trap: Zero Trust = zero access.

Trap: Non-repudiation vs. authentication.


Exam tips

  1. CIA Triad appears everywhere. Almost any security concept can be tied back to confidentiality, integrity, or availability. When you see a scenario, ask “Which part of CIA does this protect?”
  2. Zero Trust control plane vs. data plane is a high-frequency exam topic. Know the three components: policy engine, policy administrator, and policy enforcement point. Remember PEP = data plane.
  3. Non-repudiation is not authentication. Authentication proves identity at login; non-repudiation proves you cannot deny a past action (digital signatures are the key mechanism).
  4. Honeypot vs. honeytoken — Systems vs. data. The exam likes to test this distinction.
  5. Physical security is testable. Don’t skip bollards, access vestibules, and sensor types.
  6. Gap analysis is a planning/governance concept. It does not fix anything by itself; it identifies what needs to be fixed.
  7. MFA requires DIFFERENT factors — Two passwords are not MFA.

Key terms


Examples / scenarios

Scenario 1: A hospital’s patient records system goes offline during a DDoS attack. Patients cannot be treated because doctors cannot access medication histories.

Scenario 2: An attacker intercepts network traffic and modifies a wire transfer amount from $10,000 to $100,000.

Scenario 3: A disgruntled employee emails a confidential client list to a competitor.

Scenario 4: A security team deploys a file named employee_salaries_2026.xlsx on a file share. The file contains fake data and is monitored for access.

Scenario 5: An organization notices that its firewall rules allow all internal traffic without inspection. After reading the NIST Cybersecurity Framework, the team documents 47 controls they have not yet implemented.

Scenario 6: A user signs a contract electronically using a PKI-based digital signature. Later, the user claims they never signed it. The organization presents the digital signature and certificate chain as proof.


Mini quiz

Question 1: Which component of the CIA Triad is most directly addressed by implementing RAID and backup solutions? **Answer:** Availability. RAID and backups ensure data remains accessible even if hardware fails.
Question 2: In a Zero Trust architecture, which component makes the decision to grant or deny an access request? **Answer:** The policy engine. It evaluates access requests against defined policies and makes the grant/deny/revoke decision.
Question 3: An organization inserts fake credentials into a database. When those credentials are used to attempt a login, a security alert fires. What is this technique called? **Answer:** Honeytoken. The fake credentials are data elements designed to detect unauthorized use.
Question 4: A user sends a digitally signed email. The recipient verifies the signature using the sender's public key. Which security concept does this primarily demonstrate? **Answer:** Non-repudiation. The digital signature proves the sender authored the message and cannot deny it.
Question 5: What is the difference between a honeypot and a honeynet? **Answer:** A honeypot is a single decoy system; a honeynet is a network of multiple honeypots designed to simulate an entire environment and lure attackers into a monitored fake network.
Question 6: A company redirects DNS queries for known malware C2 domains to a non-routable address. What technique is this? **Answer:** DNS sinkhole. It disrupts malware C2 communication by returning false DNS results for malicious domains.
Question 7: In the AAA framework, which component is responsible for tracking what a user did after they logged in? **Answer:** Accounting. It records user activities for audit and forensic purposes.
Question 8: A hospital implements disk encryption on all servers storing patient records. Which principle of the CIA triad does this primarily support? **Answer:** Confidentiality. Encryption protects data from unauthorized viewing, even if physical media is stolen.
Question 9: A user logs in with username/password, then receives a code on their smartphone that they must enter. How many authentication factors are being used? **Answer:** Two factors (MFA). Password = something you know. Smartphone code = something you have. This is proper multi-factor authentication because it uses two DIFFERENT types of factors.
Question 10: A company allows remote workers to access internal resources without VPN, but requires device health checks, geolocation verification, and behavior analysis before granting access. What security model is this? **Answer:** Zero Trust. Key indicators: no implicit trust (no automatic VPN trust), continuous verification (device health, location, behavior), context-based access decisions.

CompTIA-style practice questions

Question 11: Which of the following BEST describes the difference between authentication and authorization?
A. Authentication verifies identity; authorization determines access rights
B. Authorization verifies identity; authentication determines access rights
C. Authentication is done first; authorization is optional
D. Authorization requires MFA; authentication does not
**Correct Answer: A** - Authentication = Proving WHO you are (ID verification) - Authorization = Determining WHAT you can do (permissions) They happen in sequence: authenticate FIRST, then authorize. - B: Backwards - C: Authorization is not optional in secure systems - D: Either can use MFA; not a distinguishing factor
Question 12: A financial services company implements a system that creates tamper-evident logs of all transactions with timestamps and digital signatures. Which security concept is primarily being addressed?
A. Confidentiality
B. Availability
C. Non-repudiation
D. Authorization
**Correct Answer: C. Non-repudiation** Digital signatures + timestamps = proof of action that cannot be denied. Key words: "tamper-evident" and "digital signatures" point to non-repudiation. - A: Not about keeping data secret - B: Not about system uptime - D: Not about determining access rights
Question 13: An organization conducts an assessment comparing their current security controls against industry best practices and compliance requirements. What is this called?
A. Penetration test
B. Gap analysis
C. Risk assessment
D. Vulnerability scan
**Correct Answer: B. Gap analysis** Gap analysis specifically compares CURRENT state vs DESIRED state (best practices, compliance). Keywords: "comparing current" + "against requirements." - A: Penetration test = simulated attack - C: Risk assessment = identifying and analyzing risks - D: Vulnerability scan = identifying technical vulnerabilities
Question 14: Which of the following is NOT a component of the Zero Trust control plane?
A. Policy engine
B. Adaptive identity
C. Policy enforcement point
D. Threat scope reduction
**Correct Answer: C. Policy enforcement point** PEP is part of the DATA PLANE (where enforcement happens), not the CONTROL PLANE (where decisions are made). - Control Plane: Policy engine, policy administrator, adaptive identity, threat scope reduction, secured zones - Data Plane: Subject/system, policy enforcement point This is a common exam trap!
Question 15 (Multi-select): A company wants to implement MFA. Which TWO combinations provide true multi-factor authentication?
A. Password + PIN
B. Password + Fingerprint scan
C. Smart card + PIN for the smart card
D. Fingerprint + Iris scan
E. Username + Password
**Correct Answers: B and C** - **B**: Password (knowledge) + Fingerprint (inherence) = 2 different factors - **C**: Smart card (possession) + PIN (knowledge) = 2 different factors Why others are wrong: - A: Both are "something you know" (same factor) - D: Both are "something you are" (same factor) - E: Both are "something you know" (not even MFA) **Key Point:** Count the TYPES of factors, not the number of credentials!

Real-world applications

Confidentiality: Healthcare encrypting patient records (HIPAA), finance protecting credit card numbers (PCI-DSS), government classifying sensitive documents.

Integrity: Software code signing certificates, hash verification of downloaded files, blockchain immutable transaction records.

Availability: E-commerce load-balanced web servers, banking redundant data centers, emergency services backup communication systems.

Zero Trust: Google’s BeyondCorp, Microsoft’s Conditional Access, cloud access security brokers (CASB).



Domain 1: General Security Concepts

Objective Title Status
1.1 Compare and contrast various types of security controls done
1.2 Summarize fundamental security concepts (current) done
1.3 Explain the importance of change management processes done
1.4 Explain the importance of using appropriate cryptographic solutions done
← Previous: Objective 1.1 Back to Dashboard Next: Objective 1.3 →