Memory Deck Flashcards
SLE = AV * EF
Single Loss Expectancy (SLE) - Negative impact for one-time occurrence
Asset Value (AV)
Exposure Factor (EF) - If a flood will damage 40% of your data center, EF is 40%
ARO
Annual Rate of Occurance
ALE = ARO * SLE
🍺 = 😍 (get it?)
Ale makes arousal
Annual Loss Expectancy = Rate of Occurrence - Single Loss Expectancy
===
(Mario saying): “I’ve got something up my sleav-ef”.
STRIDE - Microsoft threat modeling tool
S poofing
T ampering
R epudiation - attacker can deny participation
I nformation disclosure
D enial of service
E levation of privilege
Due Diligence
: Do Detect
Imagine you have a pool. To protect children and animals from drowning in your pool, you exercise due care by building a fence around the pool. Regularly checking the fence for vulnerabilities and correcting them demonstrates due diligence.
ISC2 Ethics: PAPA
Protect, Act, Provide, Advance.
Due Care
Due Care:
Do correct.
A vendor engaging in a reasonable and expected manner for the circumstance
Imagine you have a pool. To protect children and animals from drowning in your pool, you exercise due care by building a fence around the pool. Regularly checking the fence for vulnerabilities and correcting them demonstrates due diligence.
PTA keeps the children safe!
P hysical - Tangible. Locks, guards, alligator moats, etc.
T echincal/Logical - Automated or electronic systems.
A dministrative - Policy, signage.
Security through obscurity:
Data Hiding.
RMF:
“Proper Crime Scene Investigators Always Act Modestly” = Prepare, Categorize,
Select, Implement, Assess, Authorize, Maintain.
ALE= SLE x ARO:
ArROw SLEd = ALE is beer, so “A Drunk guy shooting
arrows on a sled”.
ISO:
“Raging Crackheads Risk Health” = Requirements, Code of practice, Risk
Management, Health (ISO27001, 27002, 27005, 27799).
Security Models:
Simple/R = read ; */W = write ; U = UP ; D = DOWN
Bell LaPadula:
Confidentiality – Simple N R U || * N W D || Strong * N R/W
U/D.
Biba:
Integrity – Simple N R D || * N W U || Invocation N R/W U.
Hashing:
HA or MD in the name.
Asymmetric:
DEREK-Q = D=Diffie-Hellman E=ElGamal R=RSA E=ECC K=Knapsack Q=Quantum.
Symmetric:
23BRAIDS = 2=Twofish 3=3DES B=Blowfish R=RC5 A=AES I=IDEA D=DES S=Skipjack.
Fire Extinguisher Classes:
A - Ash -> Combustible
B - Boil -> Liquid
C - Current -> Electrical
D - Dent -> Metal
K - Kitchen -> Oil/Fat
CPU Pipelining order:
FDEW = Fetch, Decode, Execute, Write.
OSI Model:
Physical, Datalink, Network, Transport, Session, Presentation, Application.
Layer 1-7: Please Do Not Throw Sausage Pizza Away.
Layer 7-1: All People Seem To Need Data Processing.
Helpful mnemonics (for the OSI from top to bottom or 7 to 1):
All People Seem To Need Data Processing
All People Should Try New Dairy Products
All People Studying This Need Drastic Psychotherapy
As Pauly Shore Tweeted, “Nice Dress, Pops!”
Helpful mnemonics (for the OSI from the bottom up or 1 through 7):
Pete doesn’t need to sell pickles anymore
Please Do Not Take Sales People’s Advice
Please Do Not Touch Slimy Purple Algae
Programmers Do Not Throw Stale Pizza Away
Please Do Not Teach Stupid People Acronyms
7 Application; Service Protocols, DNS, FTP, HTTP/s, WAF 6 Presentation; Data formats, GIF, JPG, MOV 5 Session; Auth/crypto, establishes and terminates connections between apps, RPC, PAP, Circuit level fw. 4 Transport; Ports, L2TP, TCP, UDP, SSL, TLS can be done at L3, *Stateful and Packet FW 3 Network, PPTP, chap, IP, RIP, IPSEC, Routers, Brouter, *Stateful and Packet FW 2 Data Link; Host to host links, PPP, Ethernet. Contains, Bridges, Switches, Stateful fw. i Logical Link Control ii MAC 1 Physical; Fibre, Eth Cable, Hub
TCP/IP Model:
NITA - Network access, Internet, Transport, Application.
Armadillos Take In New Ants
DREAD:
Damage, Reproducibility, Exploitability, Affected users, Discoverability.
Evaluation Assurance Level (EAL):
FSMM-SSF:
FSMM-SSF: For Sure My Mother-So Sweet Forever.
Fun Stress Method Medical-Doctors Seem Somewhat Verifiably Foolish.
Functionally, Structurally, Methodically, Methodically Designed, Semi-formally,
Semi-formally Designed, Verified, Formally Verified.
Incident Response Forensics:
PDRMR3L =People in Canada Eat Raw Lettuce = Prepare, Detect, Response, Mitigate,
Reporting, Recovery, Remediation, Lesson Learned.
IDEAL:
Initiating, Diagnosing, Establishing, Acting, Learning.
The Ring Model: Zero KODU
-VM KODU = -1 VM hosts, 0 Kernel, 1 Operating System, 2
Drivers, 3 User.
DHCP:
DORA - Discover, Offer, Request, ACK.
Digital forensics model:
I Prefer Coffee Everytime Anyone Provides
Donuts = Identification, Preservation, Collection, Examination, Analysis,
Presentation, Decision.
Change Management Steps:
RRA/RTID Request, Review, Approve or
Reject, Test, Implement, Document.
The 7 steps of a cyber-attack:
RSA ESA O = Reconnaissance, Scanning,
Access and Escalation, Exfiltration, Sustainment, Assault, Obfuscation.
SW-CMM:
I Ran Down My Ostrich = Initial, Repeatable, Defined,
Managed, Optimized.
BCP Steps:
BCP policy → BIA → Identify preventive controls → Develop
recovery strategies → Develop DRP → DRP training/testing → BCP/DRP
maintenance
SDLC1:
IDIOD - Don’t be an IDIOD = Initiation, Design, Implement,
Operations, Disposal
SDLC2:
“I Reckon All Dem Dere Taters’ Really Delicious” = Initiation,
Requirements, Architecture, Design, Develop, Testing, Release,
Disposal.
ACID:
Atomic, Consistency, Isolation, Durability.
Evidence must be:
Authentic,
Complete,
Admissible,
Convincing,
Accurate
Type 2 errors
are FAR away.
PGP
is a good IDEA.
SPF-B
B(urn) Transport Layer—Segments (TCP) (SOME) DATAGRAM (UDP) Network Layer—Packets (PEOPLE) Data Link Layer—Frames (FEAR) Physical Layer— Bits (BIRTHDAYS)
IDEAL -
Initiating, Diagnosing, Establishing, Acting, Learning
SCMM -
Initial, Repeatable, Defined, Managed, Optimized
I RAN DOWN MY OSTRICH
SDLC
PADDTIM - Planning, Analysis, Design, Development, Testing, Implementation, Maintenance
BCP:
Inguannas In Paris Really Cant Teach Me = Iniitation, Impact, Preventative, Recovery, Continuity, Test, Manage
Blackout
Fault
Brownout
Sag
Inrush
Spike
Surge
Complete loss of power Blackout
Brief/Moementary Loss of Power Fault
Prolonged/Extended drop in voltage Brownout
Brief drop in voltage Sag
Initial power rush
(i.e., after an outage) Inrush
Momentary rush of power Spike
Prolonged/Extended rush of power Surge
Big Fat Bears Sleep in Snoring Slumber
Before Face Book Some Introverts Stayed Silent
Blue Falcons Bring Simply Incredible Soaring Sights
Best Friends Believe Silence Is Simply Silly
20,21
- FTP, File Transfer Protocol
22
- ssh, secure shell
23
- Telnet
25 -
SMTP, Simple Mail Transport Protocol
53 -
DNS
69 -
TFTP, Trivial File Transfer Protocol
80 -
HTTP, HyperText Transfer Protocol
110 -
POP3, Post Office Protocol (version 3)
119
- NNTP, Network News Transport Protocol
124 -
NTP, Network Time Protocol
143
- IMAP, Internet Message Access Protocol (version 4)
161
- SNMP, Simple Network Management Protocol
3389
dedicated to Remote Desktop Protocol (RDP)
6000- X-Windows
How Kerberos Work
- You go to the Amusement Park and Buy a Ticket from the Main Entrance Counter to Enter into the Amusement Part to Enjoy The Rides, whichever you have paid for. (Which we call TGT - Ticket Granting Ticket)
- He goes to the first rider and says I want to ride MarygoRound and present the Ticket (TGT) to the Rider. But the rider says, show me the ticket that you have to ride this ride.
- Rider suggest him to go to the different counter to get the ticket for this Ride (Call it Service Ticket). He goes to that counter and shows his Ticket (TGT) and gets Service Ticket for the MarrygoRound Ride.
- After getting the Service Ticket, he shows it to the Rider and he allows him for this Ride. He Enjoys the Ride.
- Overview
- In Reality How it Happens
- User Sends a Authentication Service Request to Domain Controller
- Domain Controller Sends Back Authentication Service Response along with TGT Key
- User Send an Application Request along with the TGT Key to the Domain Controller
- Domain Controller Sends Back TGT Response along with the Service Ticket to Access the Requested
Application - User sends a Request to the Application Server along with the Service Key
- Application Server Validates it and Grant Permission to Access it
Patent
= 20 years. Notice there is the word “ten” in Patent. 10 fits better into 20, than it does 70 (Copyright).
Take-Grant:
Take Grant to the Colorado Rockies (Take/Grant/Create/Remove). The OSG is also light on this, as you only need to know what it is, and how it compares to the other models.
Clark-Wilson -
it’s an integrity model.
IPS
IaaS
– Many hosts Infrastructure. Best if your app really requires complex infrastructure (such as 5 databases, 10 firewalls, etc).
IPS
PaaS
– One host. Best if: your app can run on 1 host, and you are concerned about: liability, security, time, and money wasted configuring code and infrastructure. PaaS is much more liability-optimal than IaaS. PaaS is the easiest to administer. PaaS your code – so IaC is PaaS.
IPS
SaaS
– Service. Service is the most affordable, has least liability to the customer and the cheapest, but it takes time to configure code to work with SaaS and cloud.
BPA
– BiPlane Joint-Venture agreement
OLA
– Like Windows OLE (internal, under-the-hood) – under-the-hood ‘SLA’ internal agreement between (C)SP and its brokers.