CramX Logo
Back to FlashcardsInformation Technology / CompTIA Security+ (SY0-601): Weak Points

CompTIA Security+ (SY0-601): Weak Points

Information Technology39 CardsCreated 9 months ago

This section covers standards and protocols used to share cybersecurity intelligence across organizations. It includes RFCs as foundational documents, AIS for real-time threat indicator sharing, and the STIX/TAXII framework for structuring and securely transmitting threat data in a standardized, machine-readable format.

Report

RFC

Request for Comments:
Published by ISOC
Not all RFCs are standards documents (experimental, best practice, standard track)
Many informal RFCs analyze threats

An RFC is authored by individuals or groups of engineers and computer scientists in the form of a memorandum describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems

Rate to track your progress ✦

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/39

Key Terms

Term
Definition

RFC

Request for Comments:
Published by ISOC
Not all RFCs are standards documents (experimental, best practice, standar...

AIS

Automated Indicator Sharing:
A US government initiative for real-time sharing of cyber threat indicators

STIX

Structured Threat Information Expression:
A standardized XML programming language for conveying data about cybersecur...

TAXII

Trusted Automation Exchange of Intelligence Information:
Defines how cyber threat information can be shared via servi...

SRTP

Secure Real-Time Transport:

RTP for delivering A/V over IP networks

SFTP vs. FTPS

SFTP: SSH FTP

FTPS: FTP over SSL/TLS