Memorization Sheet
Memorization Sheet
net
Memorization Sheet
Copy this information down several times until it’s burned into memory
https://cissprep.net/
Type I – snapshot
Type II – period of time
SOC III – public audience
Participation – the data subject should have the option to opt in or opt out.
Limitation – data can only use it for the purpose stated
Scope – there must be a specific purpose (and it must be legal/ethical), the scope should be
include in the notification.
Acquire - Accuracy – the data must be as accurate as possible, and the data subject should be
able to make corrections.
or
Reveal - Retention – the data should be kept only as long as it’s needed.
Some - Security – the custodian must protect the data.
Do - Dissemination – the custodian must not share the data without notifying the data subjec
Nuts - Notification – must notify the user that you’re collecting and creating their data before it’s
used, should include purpose of use.
OSI model: people don’t need to snap photos anymore (thanks to smartphones), starting w/phys
layer going up. (Copy the table below from bottom up)
d 7 A nymore A
d 6 P hotos A
d 5 S nap A
s 4 T o t
p 3 N eed i
f 2 D on’t N
CISSPrep.net
Memorization Sheet
Copy this information down several times until it’s burned into memory
https://cissprep.net/
b 1 P eople N
Security Awareness:
● Education – formal Evaluation is also formal (notice E+E = formal)
● Training – semi-formal Review is casual
● Awareness – casual
Penetration testing:
Properties: simple = read; star = *write (old-school files have star in titlebar when edited)
● Detection – finding, discovering, observing, and telling someone (ideally the proper
person/manager).
● Response – actions to determine/triage whether or not it’s a true incident. Includes
discussion with others to help decide, and declare the incident.
● Mitigation – this is the “stop the bleeding” step, such as disconnecting the network cable
when a device is compromised, or recording/capturing of logs (whatever your incident
response plan indicates is the first step).
● Reporting – alerting stakeholders of the incident. This includes clients/customers,
vendors, senior management, users, employees, the public/media, law enforcement.
● Recovery – return the environment to a state of normalcy, such as re-imaging the
infected Remediation – addressing the root cause. Even though a vulnerability may
have been exploited, perhaps the patch management process itself was the issue (in not
being timely or effective).
● Lessons Learned – in this phase the participants get together to “hash out” or discuss
openly the successes, failures, and areas where improvement is needed. This phase
helps deal with future similar incidents and helps to improve the process itself.
Full backup – as the name indicates, this is a copy of all data in the environment.
Differential – copying of data that changed since the last backup. Faster than doing a full
backup.
Incremental – copying of data that has changed since the last backup (of any kind).
RAID – redundant array of independent disks, is a method used to prevent downtime when a
storage component fails.
Striping – divides the data between disks.
Raid 0 – stripes over 2 disks.
Raid 1 – mirrors 2 disks
CISSPrep.net
Memorization Sheet
Copy this information down several times until it’s burned into memory
https://cissprep.net/
Raid 5 – data and parity info are striped (3 disk minimum) – data is striped across 2, and parity
stored on 1
Raid 10 – mirrored, then striped (4 disks)
Asymmetric types (all others will be symmetric) this mnemonic is from Kelly Handerhan from
Cybrary.it:
● E brothers: ECC and ElGamal
● SA brothers: RSA and DSA
● Doogie Howser has a Knapsack: DH (Diffie Hellman) and Knapsack
SDLC: PFSDATCTRM. “Please fry some dead animals to catch the right man.”
· Repeatable – reactive practices and a bit more organized but not necessarily defined.
· Are – Approval/denial