GitHub - DerreckM - CISSP-Mnemonics
GitHub - DerreckM - CISSP-Mnemonics
24 stars 8 forks
Star Notifications
master Go to file
README.md
Also known as public key encryption (public key can be publicized without
compromising security)
Remember: DEREK
Diffie-Hellman/DSA
El-Gamal
RSA
Elleptical Curve Cryptography (ECC)
Knapsack
Symmetric Encryption
Also known as [s]hared key or [s]ecret key encryption. Private key can be sent out-
of band
Remember: 23BRAIDS
2TwoFish
https://github.com/DerreckM/CISSP-Mnemonics 1/7
1/9/22, 7:58 AM GitHub - DerreckM/CISSP-Mnemonics
3DES
Blowfish
RC5
AES
IDEA
DES
SAFER/Skipjack
Hash Functions:
MD can create a 128-bit hash value. SHA can create a 160-bit hash value (SHA-1),
SHA-256 produces a 256-bit hash , SHA-384 produces a 384-bit hash, and SHA-
512 produces a 512-bit hash.
OSI Model:
Risk Management
Multi-Factor Authentiation:
https://github.com/DerreckM/CISSP-Mnemonics 2/7
1/9/22, 7:58 AM GitHub - DerreckM/CISSP-Mnemonics
Biba and Clark Wilson have the letter i in them, so Integrity Models Bell-LaPadula
is confidential: No read up and No write down. (said another way, Bell is WURD)
that is, for systems that process classified data, what each user is required to have
Dedicated mode - have a security clearance, access approval, and valid need to
know for ALL data processed by Dedicated system
System High mode - have a security clearance and access approval for ALL
data processed by System high mode system. Also, valid need to know for
data PERSONALLY accessed.
Multilevel mode - have a security clearance, access approval, and valid need to
know for data PERSONALLY accessed. (Requirements are enforced primarily by
hardware or software on the system, not by limiting physical access)
https://github.com/DerreckM/CISSP-Mnemonics 3/7
1/9/22, 7:58 AM GitHub - DerreckM/CISSP-Mnemonics
Network Topologies
ring topology is most secure. (if it is dedicated with no external connections) bus
topology is cheap, easy to set up, and good for small LANs. (If the single line of
cable breaks, the network is down, devices can see others' packets)
star topology is most common. (more resilient than two above if a device fails, but
still dependent on central switch or hub)
mesh topology is best for redundancy. (with Full mesh if a node fails, network
traffic can be directed to any of the other nodes)
Note: There is also partial mesh, some nodes are organized in a full-mesh scheme,
but others are connected to only one or two in the network. Partial mesh topology is
commonly found in peripheral networks connected to a full meshed backbone network.)
DR Recovery Sites
Warm site- Organization has alt. site with equipment and data circuits available but
nothing is connected and everything needs to be set up. The main requirement in
bringing a warm site to full operational status is the transportation of appropriate
backup media to the site and restoration of critical data on the standby servers. This
can take from a a one to three days. (Sybex says as little as 12 hrs., other sources
24- 48 hrs.)
Cold site- Organization has alternate site with power and cooling, but equipment
needs to be ordered and may take a few days to several weeks to arrive, be
configured, and then restoration of backup media.
https://github.com/DerreckM/CISSP-Mnemonics 4/7
1/9/22, 7:58 AM GitHub - DerreckM/CISSP-Mnemonics
i. Baselining
ii. Patch management
iii. Vulnerability management
i. Detection
ii. Response
iii. Mitigation
iv. Reporting
v. Recovery
vi. Remediation
vii. Lessons Learned
BCP Steps:
https://github.com/DerreckM/CISSP-Mnemonics 5/7
1/9/22, 7:58 AM GitHub - DerreckM/CISSP-Mnemonics
MISCELLANEOUS
Using a condom is due care, taking the steps to decide whether to use the condom
is due diligence. (Source: Luke Ahmed)
Entrapment is when law enforcement persuades someone to commit a crime that they
otherwise would not have committed. Enticement is when the person would have
committed (or intended to commit the crime) anyway. (Source: Sybex OSG 7th Ed.)
(Think: You can entice a criminal, but only entrap an otherwise honest person.)
Pipelining - method by which CPU can process more than 1 instruction per clock cycle
Fetch -> Decode -> Execute -> Write Once an instruction moves on to next stage,
a new instruction can be fetched
need to know - user has no access to info. that is not required by the user
Example: Restricting a CIO from accessing financial reports
least privilege- user has no more access to a resource than what is required to do that
user's job Example: User who reviews sales figures has read-only access, but cannot
modify them
https://github.com/DerreckM/CISSP-Mnemonics 6/7
1/9/22, 7:58 AM GitHub - DerreckM/CISSP-Mnemonics
WTFPL License
Disclaimer: Some of my mnemonics and tips are my own creations. Some are
freely given on Reddit. I strive to give credit to original source when and where
applicable.
This program is free software. It comes without any warranty, to the extent permitted by
applicable law. You can redistribute it and/or modify it under the terms of the Do What The
Fuck You Want To Public License, Version 2, as published by Sam Hocevar. See
http://www.wtfpl.net/ for more details.
Releases
No releases published
Packages
No packages published
https://github.com/DerreckM/CISSP-Mnemonics 7/7