Anagrams, Mnemonic, Data Dumps, etc.
Data Dump
Encryption
DEER MRS H CARBIDS
Asymmetric: encrypt with 1 key, decrypt with other Key exchange,
Confidentiality, Nonrepudiation, Integrity
- D – Diffie-Hellman
- E – El Gamal: DH +nonrepudiation
- E – ECC
- R – RSA
Hash- one-way algorithm, no key
- M – MD5
- R – RIPEMD (160)
- S – SHA (3)
- H – Haval (v)
Symmetric: Encryption, one key
- C – CAST
- A – AES: 128k, 10r; 192k, 12 r; 256k, 14r
- R – RC 4, 5, 6
- B – BLOWFISH: 23-448k, 64bit block
- I – IDEA : 128k, 64bit block
- D – DES-64-bit block, 16r
- S – SERPENT
Links
Networking
OSI Model
Please do not throw sausage pizza away
- P – Physical
- D – Data Link
- N – Network
- T – Transport
- S – Session
- P -Presentation
- A – Application
Security Controls
Functionality
When classifying these, think of their PRIMARY purpose
DR PCCD
Dr PCDC?
- D – Detective
- Access Logs
- Security cameras (Primary function, deterrent would be secondary)
- Motion Detectors
- R – Recovery
- Backups
- DR site
- P – Preventive
- Firewalls
- Locks
- Security policy
- Antivirus / anti-malware
- C – Compensating
- Installing a fence vs. Security guards
- Using a proxy server when a vulnerable firewall port must be opened.
- C – Corrective
- Computer images
- D – Deterrent
- Signs, lights, fences?
Types
APT
- A – Administrative
- Procedures and Policies
- Hiring Practices
- Security Awareness
- Signs?
- P – Physical
- Dogs
- Security Guards
- Locks
- Fences
- Security Cameras?
- T – Technical
- Biometric Scanners
- SSO
- Multifactor Auth
- Smart Cards
- Encryption