Lists to Memorize Flashcards
Procedures/Things to remember under concepts. (58 cards)
CIA Triad
Confidentiality
Integrity
Availability
CIANA Pentagon
Confidentiality
Integrity
Availability
Non-Repudiation
Authentication
AAA of Security
Authentication
Authorization
Accounting
Security Control Categories
Technical
Managerial
Operational
Physical
Types of Security Controls
Preventative
Deterrent
Detective
Corrective
Compensating
Directive
4 Kinds of Redundancy
Server
Data
Network
Power
5 Methods of Authentication
Something you know: Knowledge Factor
Something you have: Possession Factor
Something you are: Inherence Factor
Something you do: Action Factor
Somewhere you are: Location Factor
5 Steps of Accounting
- Audit Trail
- Regulatory Compliance
- Forensic Analysis
- Resource Optimization
- User Accountability
Steps of Gap Analysis
- Define the scope of the analysis.
- Gather data on the current state of the organization.
- Analyze the data to identify the gaps.
- Develop a plan to bridge the gap.
6 Triggers of Social Engineering
- Authority
- Urgency
- Social Proof
- Scarcity
- Likability
- Fear
6 Kinds of Phishing Attacks
- Phishing
- Vishing
- Smishing
- Whaling
- Spear Phishing
- Business Email Compromise (BEC)
10 Types of Computer Viruses
- Boot Sector
- Macro
- Program
- Multipartite
- Encrypted
- Polymorphic
- Metamorphic
- Stealth
- Armored
- Hoax
Operating System Rings
Ring 0 = Kernel
Ring 1 = Administrator
Ring 2 = Between Administrator and User
Ring 3 = User
9 Indications of Malware Attacks
- Account Lockouts
- Concurrent Session Utilization
- Blocked Content
- Impossible Travel
- Resource Consumption
- Resource Inaccessibility
- Out-of-Cycle Logging
- Missing Logs
- Published or Documented Attacks
Commercial Data Classifications
Public
Private
Confidential
Critical
Government Data Classifications
Unclassified
Sensitive but Unclassified
Confidential
Secret
Top Secret
Forms of Data Ownership
Data Owner
Data Controller
Data Processor
Data Steward
Data Custodian
3 States of Data
Data-at-Rest
Data-in-Transit
Data-in-Use
Types of Data
Regulated Data
Personal Identification Information (PII)
Protected Health Information (PHI)
Trade Secrets
Intellectual Property (IP)
Legal information
Financial information
Human-readable vs. Non-human readable data
Data Loss Prevention (DLP) Systems
Endpoint DLP System
Network DLP System
Storage DLP
Cloud-based DLP System
Symmetric Algorithms
Data Encryption Standard (DES)
Triple DES (3DES)
International Data Encryption Algorithm (IDEA)
Advanced Encryption Standard (AES)
Blowfish
Twofish
Rivest Cipher (RC4)
Rivest Cipher (RC5)
Rivest Cipher (RC6)
Asymmetric Algorithms
Digital Signature = Private Key Hash to verify authorship
Diffie-Hellman (DH) = Secure Key Exchange Method
Rivest, Shamir, and Adleman (RSA)
Elliptic Curve Cryptography (ECC)
Elliptic Curve Diffie-Hellman (ECDH)
Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)
Elliptic Curve Digital Signature Algorithm (ECDSA)
Hashing Algorithms
MD5 = Susceptible to hash collisions, insecure
SHA-1 = Outdated first version
SHA-2 = SHA-256 is most secure version, all other versions are insecure
SHA-3 = Most recent family, all versions are secure
RIPEMD (RACE Integrity Primitive Evaluation Message Digest) = Hash family that competes against SHA
RIPEMD-160 = Competitor to SHA-256
HMAC (Hash-based Message Authentication Code) = Protocol that checks messages to validate authenticity
Digital Security Standard (DSS) = Hash algorithm used by government
Digital Certificates
Digital Certificate
Wildcard Certificate
Single-Sided Certificate
Dual-Sided Certificate
Self-Signed Certificate
Third Party Certificate