0% found this document useful (0 votes)
1 views

Cybersecurity_Quick_Reference_Sheet

The document is a quick reference sheet for cybersecurity concepts and tools, covering various terms such as netstat, Nmap, and types of malware like Trojans and worms. It outlines key principles like the CIA triad, least privilege, and separation of duties, as well as controls and methodologies for risk management and data protection. Additionally, it includes technical details on network protocols and security measures such as IDS, IPS, and firewalls.

Uploaded by

mattlarocca04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

Cybersecurity_Quick_Reference_Sheet

The document is a quick reference sheet for cybersecurity concepts and tools, covering various terms such as netstat, Nmap, and types of malware like Trojans and worms. It outlines key principles like the CIA triad, least privilege, and separation of duties, as well as controls and methodologies for risk management and data protection. Additionally, it includes technical details on network protocols and security measures such as IDS, IPS, and firewalls.

Uploaded by

mattlarocca04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cybersecurity Quick Reference Sheet

Netstat: Shows network connection state


Nmap: Scans systems on a network (e.g., port 80)
Indicator of Compromise: Residual sign of a successful or ongoing attack
Dig: Command-line DNS lookup tool
NOT a Security Control Functional Type: Stateful
Trojan: Masquerades as legit software
Worm: Self-propagating standalone malware
Virus: Spreads by infecting other files
Backdoor: Bypasses authentication for access
Backup Solution: Corrective control
Locks on Doors: Physical control
Warning Signs: Deterrent control
Logs: Detective control
Digital Signature: Ensures authenticity, not encryption
Symmetric Properties: Same key for enc/dec, AES is example
APT or State Actor: High-skill, geopolitical motivation
Best Insider Threat: A Former Employee
CIA Triad: Confidentiality, Integrity, Availability
Whaling Targets: High-profile individuals (execs)
VLAN or WIFI: Somewhere You Are
Mouse Behavior: Something You Can Do
Friend Vouch: Someone You Know
ARP: Between Layer 2 & 3
IP: Layer 3
TCP: Layer 4
HTTP: Layer 7
Separation of Duties: Mitigates insider compromise
Least Privilege: Limits damage scope
Job Rotation: Prevents abuse, increases skill
Mandatory Vacation: Allows audit/review
IDS: Monitors, does NOT block
IPS: Monitors AND blocks
Firewall: Controls traffic with ACLs
SIEM: Aggregates logs, detects patterns
UNTRUE Offline Attack: Authorization
Obsolete Protocol: PAP
IDS in Labs: Suricata
UNTRUE Online Attack: Must use unencrypted protocol
Network Collection in Labs: Zeek
UNTRUE ARP Poisoning: Can't be protected against
Linux Password File: /etc/shadow
False Acceptance Rate: Biometric accepts intruder
Authentication: Proving identity
Max Downtime Allowed: Maximum Tolerable Downtime
Max Data Loss Time: Recovery Point Objective
Outage to Recovery Start: Recovery Time Objective
Recovery to Full Ops: Work Recovery Time
Yearly Event Probability: Annualized Rate of Occurrence
% Asset Loss in Event: Exposure Factor
Loss per Incident: Single Loss Expectancy
Annual Loss Estimate: Annualized Loss Expectancy
Backup Since Last Full: Differential
Load Balancer Redundancy: Network
Risk Response: Risk Mitigation/Remediation
Magnetic Wipe Method: Degaussing
EM Signal Blocker: Faraday Cage
Only Needed Data Collected: Data Minimization
Irreversible Data Scrub: Anonymization
Field Replaced w/ Token: Tokenization
Evidence Protection: Chain of Custody
Non-reversible Identifier: Hashing and Salting
Data Laws by Location: Data Sovereignty
Disk Imaging Cmd: dd

You might also like