CISSP Memory Tools

  CISSP

Anagrams, Mnemonic, Data Dumps, etc.

 

Data Dump

Data Dump

Encryption

DEER MRS H CARBIDS

Asymmetric: encrypt with 1 key, decrypt with other Key exchange,
Confidentiality, Nonrepudiation, Integrity

  • D – Diffie-Hellman
  • E – El Gamal: DH +nonrepudiation
  • E – ECC
  • R – RSA

Hash- one-way algorithm, no key

  • M – MD5
  • R – RIPEMD (160)
  • S – SHA (3)
  • H – Haval (v)

Symmetric: Encryption, one key

  • C – CAST
  • A – AES: 128k, 10r; 192k, 12 r; 256k, 14r
  • R – RC 4, 5, 6
  • B – BLOWFISH: 23-448k, 64bit block
  • I – IDEA : 128k, 64bit block
  • D – DES-64-bit block, 16r
  • S – SERPENT

Links

CISSP Mnemonics

Study Group

 

Networking

OSI Model

Please do not throw sausage pizza away

  • P – Physical
  • D – Data Link
  • N – Network
  • T – Transport
  • S – Session
  • P -Presentation
  • A – Application

 

Security Controls

Functionality

When classifying these, think of their PRIMARY purpose

DR PCCD

Dr PCDC?

  • D – Detective
    • Access Logs
    • Security cameras (Primary function, deterrent would be secondary)
    • Motion Detectors
  • R – Recovery
    • Backups
    • DR site
  • P – Preventive
    • Firewalls
    • Locks
    • Security policy
    • Antivirus / anti-malware
  • C – Compensating
    • Installing a fence vs. Security guards
    • Using a proxy server when a vulnerable firewall port must be opened.
  • C – Corrective
    • Computer images
  • D – Deterrent
    • Signs, lights, fences?

Types

APT

  • A – Administrative
    • Procedures and Policies
    • Hiring Practices
    • Security Awareness
    • Signs?
  • P – Physical
    • Dogs
    • Security Guards
    • Locks
    • Fences
    • Security Cameras?
  • T – Technical
    • Biometric Scanners
    • SSO
    • Multifactor Auth
    • Smart Cards
    • Encryption

 

LEAVE A COMMENT