The document is a quick reference sheet for cybersecurity concepts and tools, covering various terms such as netstat, Nmap, and types of malware like Trojans and worms. It outlines key principles like the CIA triad, least privilege, and separation of duties, as well as controls and methodologies for risk management and data protection. Additionally, it includes technical details on network protocols and security measures such as IDS, IPS, and firewalls.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
1 views
Cybersecurity_Quick_Reference_Sheet
The document is a quick reference sheet for cybersecurity concepts and tools, covering various terms such as netstat, Nmap, and types of malware like Trojans and worms. It outlines key principles like the CIA triad, least privilege, and separation of duties, as well as controls and methodologies for risk management and data protection. Additionally, it includes technical details on network protocols and security measures such as IDS, IPS, and firewalls.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
Cybersecurity Quick Reference Sheet
Netstat: Shows network connection state
Nmap: Scans systems on a network (e.g., port 80) Indicator of Compromise: Residual sign of a successful or ongoing attack Dig: Command-line DNS lookup tool NOT a Security Control Functional Type: Stateful Trojan: Masquerades as legit software Worm: Self-propagating standalone malware Virus: Spreads by infecting other files Backdoor: Bypasses authentication for access Backup Solution: Corrective control Locks on Doors: Physical control Warning Signs: Deterrent control Logs: Detective control Digital Signature: Ensures authenticity, not encryption Symmetric Properties: Same key for enc/dec, AES is example APT or State Actor: High-skill, geopolitical motivation Best Insider Threat: A Former Employee CIA Triad: Confidentiality, Integrity, Availability Whaling Targets: High-profile individuals (execs) VLAN or WIFI: Somewhere You Are Mouse Behavior: Something You Can Do Friend Vouch: Someone You Know ARP: Between Layer 2 & 3 IP: Layer 3 TCP: Layer 4 HTTP: Layer 7 Separation of Duties: Mitigates insider compromise Least Privilege: Limits damage scope Job Rotation: Prevents abuse, increases skill Mandatory Vacation: Allows audit/review IDS: Monitors, does NOT block IPS: Monitors AND blocks Firewall: Controls traffic with ACLs SIEM: Aggregates logs, detects patterns UNTRUE Offline Attack: Authorization Obsolete Protocol: PAP IDS in Labs: Suricata UNTRUE Online Attack: Must use unencrypted protocol Network Collection in Labs: Zeek UNTRUE ARP Poisoning: Can't be protected against Linux Password File: /etc/shadow False Acceptance Rate: Biometric accepts intruder Authentication: Proving identity Max Downtime Allowed: Maximum Tolerable Downtime Max Data Loss Time: Recovery Point Objective Outage to Recovery Start: Recovery Time Objective Recovery to Full Ops: Work Recovery Time Yearly Event Probability: Annualized Rate of Occurrence % Asset Loss in Event: Exposure Factor Loss per Incident: Single Loss Expectancy Annual Loss Estimate: Annualized Loss Expectancy Backup Since Last Full: Differential Load Balancer Redundancy: Network Risk Response: Risk Mitigation/Remediation Magnetic Wipe Method: Degaussing EM Signal Blocker: Faraday Cage Only Needed Data Collected: Data Minimization Irreversible Data Scrub: Anonymization Field Replaced w/ Token: Tokenization Evidence Protection: Chain of Custody Non-reversible Identifier: Hashing and Salting Data Laws by Location: Data Sovereignty Disk Imaging Cmd: dd