security items relate

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/71

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

72 Terms

1
New cards

CSR

Common Name, Organization, Organization unit, locality, state, country, email

2
New cards

Please Don’t Cut Ever

Preparation, detection, analysis, containment, eradication, recovery, lessons learned

3
New cards

Intelligent Investigators Preserve Collected proof, Review and Produce Presentations

Information, identification, preservation, collection, processing, review, analysis, production, presentation

4
New cards

MFA

Something you have, something you are, something you know, somewhere you are

5
New cards

Threat Intelligence

Confirmed, probable, possible, doubtful, improbable, discredited

6
New cards

23BRAIDS

Twofish, 3Des, Blowfish, Rivest Ciphers, AES, IDEA, DES, Skipjack

7
New cards

DEREK

Diffle-hellman, El Gamal, RSA, Elliptic Curve, Knapsack

8
New cards

MRS.H

MD5, RIPEMD, SHA, HVAL

9
New cards

Real developers ideas take efforts

Requirements, Design, Implement, Test, Evolve

10
New cards

Please can superman implode all millionaires

Prepare, Categorize, Select, Implement, Asses, Authorize, Monitor

11
New cards

Alien Pizza doesn’t ingest organically

Ad hoc, Preliminary, Defined, Integrated, Optimized

12
New cards

AV value

Physical 0.2, local 0.55, adjacent 0.62, network 0.85

13
New cards

CIA value

None 0, Low 0.22, High 0.56

14
New cards

CVSS Value

None 0, Low 0.1-3.9, Medium 4-6.9, high 7-8.9, critical 9-10

15
New cards

Threat Intelligence value

Confirmed 90, probable 70, possible 50, doubtful 30, improbable 2, discredited 1

16
New cards

AC value

high 0.44, low 0.77

17
New cards

CVSS formula

impact score + exploit-ability

18
New cards

Impact score formula

1 - [ (1-C) (1-I) (1-A)]

19
New cards

Exploit formula

8.22 x AV x AC x PR x UI

20
New cards

PR Value

high 0.27/0.5, low 0.62/0.68, none 0.85

21
New cards

UI Value

none 0.85, required 0.62

22
New cards

NIST 800-103 acronym

Please can superman implode all millionaires

23
New cards

Risk Maturity acronym

Alien pizza doesn’t ingest organically

24
New cards

Response framework acronym

DRMRRL

25
New cards

symmetric acronym

23BRAIDS

26
New cards

Asymmetric acronym

DEREK

27
New cards

hashes acronym

Mrs.H

28
New cards

SDLC Acronym

Real developers ideas take efforts

29
New cards

DRMRRL

Detect, respond, mitigate, report, recover, remediate, lessons

30
New cards

MAC

System Rules

31
New cards

DAC

Owner decides

32
New cards

DKIM

Checks domain signature

33
New cards

SPF

Checks sending server

34
New cards

S/MIME

Encrypt & Sign email

35
New cards

DMARC

Tells what to do on failed emails

36
New cards

EES

enterprise Email secret

37
New cards

IPSEC VPN

Site to Site Tunnel

38
New cards

SSL VPN

Remote/User Access

39
New cards

PPTP VPN

Insecure obsolete

40
New cards

MPLS VPN

Large WAN VPN

41
New cards

EAP-TLS

Client certificate

42
New cards

EAP-TTLS

Tunneled authentication

43
New cards

CHAP

Challenge no encryption

44
New cards

PEAP

Protected EAP

45
New cards

XSS

Inserted into website

46
New cards

CSRF

Stored in website

47
New cards

Stateless

Forget everything

48
New cards

Stateful

Remembers everything

49
New cards

Federated

Central Info

50
New cards

Disinformation

Faked deliberate info

51
New cards

Misinformation

Unintentional fake info

52
New cards

Ephemeral

Temporary

53
New cards

IR Process

Please Don’t Cut Every Red Line

54
New cards

EDRM

Intelligent Investigators Preserve Collected Proof, Review and Produce Presentations

55
New cards

ISO/NIST Standards

111 Locks Storage, 103 Handles passwords, 01 builds security, 02 shows control, 31 manages risk, 277 Protects privacy

56
New cards

policy

intent

57
New cards

Standard

Must

58
New cards

Procedure

Steps general

59
New cards

Rulebook

Rules

60
New cards

Playbook

Plan descriptive

61
New cards

runbook

execution

62
New cards

template

Structure

63
New cards

Orchestration

Automation

64
New cards

Policy Engine

Decides

65
New cards

Policy Administrator

implements decision

66
New cards

Policy Enforcement Point

Enforces/acts on decision

67
New cards

guideline

suggest

68
New cards

data owner

owns

69
New cards

Data Controller

Controls

70
New cards

Data Steward

Shapes (Quality)

71
New cards

Data Custodian

Cares (Security)

72
New cards

Data processor

Processes