CISSP Flashcards
ISC2 Code of Ethics: Preamble
The safety and welfare of society and the common good, duty to our principals, and duty to each other requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior.
Therefore, strict adherence to this Code is a condition of certification.
ISC2 Code of Ethics: Canons
1) Protect society, the common good, necessary public trust and confidence, and the infrastructure.
2) Act honorably, honestly, justly, responsibly, and legally.
3) Provide diligent and competent service to principals.
4) Advance and protect the profession.
OSI Layers
7 Application
6 Presentation
5 Sessions
4 Transport
3 Network
2 Data Link
1 Physical
OSI: Application
Network Process to Application
Application Firewall
HTTP/S
DNS
SSH
SNMP
FTP
OSI: Presentation
Data representation and encryption.
XML
JPEG
ANSI
OSI: Session
Interhost communication and session management
OSI: Transport
End-to-end connection with error correction and detection
TCP/UDP
iSCSI (SAN
Uses segments.
OSI: Network
Local addressing, routing and delivery of packets.
Routers
Packet Filtering Firewalls
IP Addresses
ICMP
NAT
Uses Bits.
OSI: Data Link
Physical addressing and reliable point-to-point connection.
Switches
Bridges
MAC Addresses
Point-to-Point Protocol (PPP)
Point-to-Point Protocol over Ethernet (PPPoE)
ARP
Uses Frames.
OSI: Physical
Media, Signal and Binary Transmission
Uses Bits.
TCP/IP Model
Application
Transport
Internet
Link
Incident Response
Preparation
Detection
Response
Mitigation
Reporting
Recovery
Remediation
Lessons Learned
Cyber Kill Chain: Recon
Identify vulnerabilities
Cyber Kill Chain
Recon
Weaponization
Delivery
Exploit
Installation
Command & Control (C&C)
Actions
Cyber Kill Chain: Weaponization
Create Malware
Cyber Kill Chain: Delivery
Transmits weapon
Cyber Kill Chain: Exploit
Exploit vulnerability
Cyber Kill Chain: Installation
Installs persistent access point
Cyber Kill Chain: C&C
Persistent access
Cyber Kill Chain: Actions
Achieve goal, exfiltrate data, ransomware, etc.
IR: Preparation
Developing IR process, team members, etc.
IR: Detection
Triage
Identify an adverse event - an incident - and begin dealing with it.
IR: Response
Triage
IR Team is activated and begin impact assessment.
IR: Mitigation (Containment)
Action/Investigation
Minimize damage or impact from the incident.
IR: Reporting
Action/Investigation
Happens throughout incident response.
IR: Recovery
Recovery
Return to normal
Getting back to business as usual.