Comprehensive study notes covering all SY0-701 exam domains with detailed explanations, tables, and exam tips.
| Principle | Definition | Controls/Examples |
|---|---|---|
| Confidentiality | Prevent unauthorized disclosure of information | Encryption, access controls, data classification |
| Integrity | Ensure data is not modified without authorization | Hashing, digital signatures, version control |
| Availability | Ensure systems/data are accessible when needed | Redundancy, backups, fault tolerance, load balancing |
| Type | Description | Examples |
|---|---|---|
| Technical (Logical) | Hardware/software mechanisms | Firewalls, encryption, IDS, access controls, antivirus |
| Administrative (Managerial) | Policies and procedures | Security policies, training, background checks, risk assessments |
| Physical | Protect physical assets | Locks, guards, cameras, fencing, biometrics, mantrap |
| Category | Purpose | Examples |
|---|---|---|
| Preventive | Stop incidents before they occur | Firewall rules, encryption, security training, access controls |
| Detective | Identify when incidents occur | IDS, log analysis, security audits, motion sensors |
| Corrective | Fix problems after detection | Patching, restoring backups, incident response |
| Deterrent | Discourage threats | Warning signs, security cameras, login banners |
| Compensating | Alternative when primary control not feasible | Increased monitoring when can't encrypt |
| Directive | Direct actions | Policies, procedures, guidelines |
| Type | Description | Examples | Use Cases |
|---|---|---|---|
| Symmetric | Same key for encrypt/decrypt | AES, DES, 3DES, Blowfish | Bulk data encryption, file encryption |
| Asymmetric | Public/private key pair | RSA, ECC, Diffie-Hellman | Key exchange, digital signatures, PKI |
| Hashing | One-way function, fixed output | SHA-256, SHA-3, MD5 (weak) | Integrity verification, password storage |
Do NOT use: MD5, SHA-1, DES, RC4, SSL 2.0/3.0, TLS 1.0/1.1
Use instead: SHA-256+, AES-256, TLS 1.2/1.3