{"id":2512,"date":"2020-01-26T22:40:20","date_gmt":"2020-01-26T22:40:20","guid":{"rendered":"http:\/\/wiki.thomasandsofia.com\/?p=2512"},"modified":"2020-01-27T00:57:36","modified_gmt":"2020-01-27T00:57:36","slug":"cissp-memory-tools","status":"publish","type":"post","link":"https:\/\/wiki.thomasandsofia.com\/?p=2512","title":{"rendered":"CISSP Memory Tools"},"content":{"rendered":"<p>Anagrams, M<span class=\"zci__def__word text--primary\">nemonic, Data Dumps, etc.<br \/>\n<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>Data Dump<\/h2>\n<p><a href=\"http:\/\/wiki.thomasandsofia.com\/wp-content\/uploads\/2020\/01\/Data-Dump.pdf\">Data Dump<\/a><\/p>\n<h2>Encryption<\/h2>\n<h3>DEER MRS H CARBIDS<\/h3>\n<p>Asymmetric: encrypt with 1 key, decrypt with other Key exchange,<br \/>\nConfidentiality, Nonrepudiation, Integrity<\/p>\n<ul>\n<li>D &#8211; Diffie-Hellman<\/li>\n<li>E &#8211; El Gamal: DH +nonrepudiation<\/li>\n<li>E &#8211; ECC<\/li>\n<li>R &#8211; RSA<\/li>\n<\/ul>\n<p>Hash- one-way algorithm, no key<\/p>\n<ul>\n<li>M &#8211; MD5<\/li>\n<li>R &#8211; RIPEMD (160)<\/li>\n<li>S &#8211; SHA (3)<\/li>\n<li>H &#8211; Haval (v)<\/li>\n<\/ul>\n<p>Symmetric: Encryption, one key<\/p>\n<ul>\n<li>C &#8211; CAST<\/li>\n<li>A &#8211; AES: 128k, 10r; 192k, 12 r; 256k, 14r<\/li>\n<li>R &#8211; RC 4, 5, 6<\/li>\n<li>B &#8211; BLOWFISH: 23-448k, 64bit block<\/li>\n<li>I &#8211; IDEA : 128k, 64bit block<\/li>\n<li>D &#8211; DES-64-bit block, 16r<\/li>\n<li>S &#8211; SERPENT<\/li>\n<\/ul>\n<h2>Links<\/h2>\n<p><a href=\"https:\/\/github.com\/TheRealBenForce\/cissp-mnemonics\" target=\"_blank\" rel=\"noopener\">CISSP Mnemonics<\/a><\/p>\n<p><a href=\"https:\/\/drive.google.com\/drive\/folders\/1U4fc27B4gH1U0shwvZ9fvg_-1H_0jQmn\" target=\"_blank\" rel=\"noopener\">Study Group<\/a><\/p>\n<p>&nbsp;<\/p>\n<h1>Networking<\/h1>\n<h2>OSI Model<\/h2>\n<h3>Please do not throw sausage pizza away<\/h3>\n<ul>\n<li>P &#8211; Physical<\/li>\n<li>D &#8211; Data Link<\/li>\n<li>N &#8211; Network<\/li>\n<li>T &#8211; Transport<\/li>\n<li>S &#8211; Session<\/li>\n<li>P -Presentation<\/li>\n<li>A &#8211; Application<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h1>Security Controls<\/h1>\n<h2>Functionality<\/h2>\n<p>When classifying these, think of their PRIMARY purpose<\/p>\n<h3>DR PCCD<\/h3>\n<p>Dr PCDC?<\/p>\n<ul>\n<li>D &#8211; Detective\n<ul>\n<li>Access Logs<\/li>\n<li>Security cameras (Primary function, deterrent would be secondary)<\/li>\n<li>Motion Detectors<\/li>\n<\/ul>\n<\/li>\n<li>R &#8211; Recovery\n<ul>\n<li>Backups<\/li>\n<li>DR site<\/li>\n<\/ul>\n<\/li>\n<li>P &#8211; Preventive\n<ul>\n<li>Firewalls<\/li>\n<li>Locks<\/li>\n<li>Security policy<\/li>\n<li>Antivirus \/ anti-malware<\/li>\n<\/ul>\n<\/li>\n<li>C &#8211; Compensating\n<ul>\n<li>Installing a fence vs. Security guards<\/li>\n<li>Using a proxy server when a vulnerable firewall port must be opened.<\/li>\n<\/ul>\n<\/li>\n<li>C &#8211; Corrective\n<ul>\n<li>Computer images<\/li>\n<\/ul>\n<\/li>\n<li>D &#8211; Deterrent\n<ul>\n<li>Signs, lights, fences?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Types<\/h2>\n<h3>APT<\/h3>\n<ul>\n<li>A &#8211; Administrative\n<ul>\n<li>Procedures and Policies<\/li>\n<li>Hiring Practices<\/li>\n<li>Security Awareness<\/li>\n<li>Signs?<\/li>\n<\/ul>\n<\/li>\n<li>P &#8211; Physical\n<ul>\n<li>Dogs<\/li>\n<li>Security Guards<\/li>\n<li>Locks<\/li>\n<li>Fences<\/li>\n<li>Security Cameras?<\/li>\n<\/ul>\n<\/li>\n<li>T &#8211; Technical\n<ul>\n<li>Biometric Scanners<\/li>\n<li>SSO<\/li>\n<li>Multifactor Auth<\/li>\n<li>Smart Cards<\/li>\n<li>Encryption<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anagrams, Mnemonic, Data Dumps, etc. &nbsp; Data Dump Data Dump Encryption DEER MRS H CARBIDS Asymmetric: encrypt with 1 key, decrypt with other Key exchange, Confidentiality, Nonrepudiation, Integrity D &#8211; Diffie-Hellman E &#8211; El Gamal: DH +nonrepudiation E &#8211; ECC R &#8211; RSA Hash- one-way algorithm, no key M &#8211; MD5 R &#8211; RIPEMD (160) ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/wiki.thomasandsofia.com\/?p=2512\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[],"class_list":["post-2512","post","type-post","status-publish","format-standard","hentry","category-cissp"],"_links":{"self":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/2512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2512"}],"version-history":[{"count":5,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/2512\/revisions"}],"predecessor-version":[{"id":2518,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=\/wp\/v2\/posts\/2512\/revisions\/2518"}],"wp:attachment":[{"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wiki.thomasandsofia.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}