front 1
IT Asset Management (ITAM) | back 1 - Database of all IT assets
- Includes firmware, software
versions, locations, and ownership
|
front 2
Configuration Management Database (CMDB) | back 2 - Central repository of asset configurations and settings
- Works with ITAM
-
CI (Configuration Item): Individual entry in the
CMDB
|
| back 3
Includes:
- System admins
- Network admins
- Security
admins
- DB admins
- Help-desk
- Custodians
- Operators (legacy term for sys admins)
Supervisor Responsibilities:
-
Supervision (preventative)
-
Training & Awareness (detective)
-
Monitoring (detective – trust but verify)
|
| back 4 - Attack occurs shortly after a vulnerability is discovered
- No vendor fix available yet, or fix is brand-new and not
installed
|
front 5
Incident Response Terminology | back 5 -
Event: Observable occurrence
-
Hazard: Precondition that could lead to an
event
-
Incident: Adverse occurrence or policy
violation
|
front 6
CIRT (Cyber Incident Response Team) | back 6 - IRT (Incident Response Team)
- CSIRT (Computer Security
Incident Response Team)
|
front 7
Basic Incident Response Phases | back 7 - Detection and Triage
- Investigation
- Containment
- Analysis & Tracking
- Mitigation
- Recovery & Repair
|
front 8
(ISC)² Incident Response Phases | back 8 - Detection
- Response
- Mitigation
- Reporting
- Recovery
- Remediation
- Lessons
Learned
|
front 9
SANS Incident Response Phases | back 9 - Preparation
- Identification
- Containment
- Eradication
- Recovery
- Lessons Learned
|
| back 10 - User-ID
- Time & Date
- Event
Description
Note: User's name is less
important (may not be unique) |
| back 11 Knowledge about current and emerging threats to help prevent or
mitigate cyberattacks. Sources:
- Cybersecurity newsletters
- Conferences
- Social media
- Dark Web research
|
front 12
UEBA (User and Entity Behavior Analytics) | back 12 Analyzing network activity to detect anomalous behavior. Targets:
- Insider threats
- Compromised accounts
Observes: - User behavior
- Device
usage
- Security events
|
front 13
SOAR (Security Orchestration, Automation, and Response) | back 13 Term coined by Gartner to describe tools that automate repetitive
security tasks.
Benefits:
- Faster incident response
- Increased team
productivity
- Improved efficiency
|
front 14
Software-Defined Security | back 14 Security model managed through policy-driven software.
Features:
- Automates and monitors controls like IDS, network
segmentation, and access controls
- Centralized management of
security infrastructure
|
front 15
SIEM (Security Information and Event Management) | back 15 Splunk, SolarWinds, Datadog
Function:
- Aggregates and correlates logs from multiple sources
- Helps security managers understand the IT environment and detect
threats
|
| back 16 Reduce false positives without increasing false negatives.
Benefit: Minimizes analyst fatigue and
improves alert quality |
front 17
Audit Log Reduction Tools | back 17 -
Clipping Levels: Only record violations above a set
threshold
-
Event Filtering: Focus on significant events that
require attention
|
| back 18 Pioneer in forensic science Locard’s Principle of Exchange:
- Criminals bring something into the scene
- Criminals
leave with something from the scene
Key
Idea: Every encounter leaves a trace |
front 19
Suspect Narrowing Strategy | back 19
Mnemonic: M.O.M.
-
Means – Did the suspect have the tools or
ability?
-
Opportunity – Was the suspect present or able to
commit the act?
-
Motive – Did the suspect have a reason?
|
| back 20 Evidence based on what the witness was told, not what they personally
know.
Note: Not normally admissible in court. |
| back 21 Chronological documentation of evidence handling.
Must Track:
- Who had the evidence
- When it was handled
- How it was protected
Stages:
Identification, Gathering, Protection, Access,
Presentation |
| back 22 Discover what happened.
Method:
- Gather info from witnesses and victims
- Resolve
conflicting stories and timelines
|
| back 23 Obtain testimony or confession to be used as evidence in trial. |
| back 24 Educates the jury on specialized topics.
Use: Can be presented as evidence. |
front 25
Evidence Admissibility Rules | back 25
Mnemonic: S.T.R.I.C.
-
S: No unlawful Search &
Seizure
-
T: Evidence must be Trustworthy &
Reliable
-
R: Evidence must be Relevant to
the case
-
I: Proper Identification and
Protection
-
C: Maintain Chain of Custody
|
| back 26 - Discovery
- Protection
- Recording
- Collection and Identification
- Analysis
- Storage, Transportation, Preservation
- Present in
Court
- Return to Owner
|
front 27
Capturing Digital Evidence | back 27 Start from volatile forms, then move to
persistent forms. |
front 28
Order of Volatility (OOV) | back 28 - Live system info (RAM, process list, unsaved work, encryption
keys)
- Virtual memory (paging/swap/temp files)
- Physical media (hard drives, DVDs, USBs, printouts)
- Backups & networks (backup media, servers, log files, cloud
storage)
|
front 29
Hard Drive Analysis Process | back 29 - Install write-blocker (Forensic Disk Controller)
- Hash
the drive
- Create forensic bit-level images
- Hash
the images to verify integrity
- Use images for analysis
|
| back 30 Disk areas with lingering data from deleted files.
Forensics Tip: Inspect slack space for hidden
data fragments. |
| back 31 -
Direct/Testimony: Witness statements
-
Real/Physical: Objects proving/disproving
guilt
-
Documentary: Records, photos, manuals
-
Digital: Emails, backups, browser history
- ⚠️ Less reliable due to tampering risks
-
Demonstrative: Models, timelines,
re-enactments
|
front 32
Types of Evidence (Legal Definitions) | back 32 -
Conclusive: Irrefutable, cannot be
contradicted
-
Corroborative: Supports existing evidence
-
Circumstantial: Implies facts without direct
proof
|
front 33
Types of Digital Forensics | back 33
1. Media Analysis:
- Examines computers, storage devices, printers, faxes,
smartphones, data, files, photos, recycle-bin, etc.
2. Software Analysis:
- Examines applications and their output
- Analyzes
malware and its consequences
3. Network Analysis:
- Examines logs, ISP logs, tools used, and affected devices
- Traces email headers to locate sources
|
front 34
Legal Terms in Digital Forensics | back 34 -
Legal Hold: Notice to preserve relevant
evidence
-
eDiscovery: Locating and securing electronic
evidence for trial
-
Search Warrant: Court order for search and
seizure
-
Subpoena: Legal order for witness or evidence
submission
-
Wire Tapping: Eavesdropping on communications
(requires warrant or consent)
|
front 35
Categories of Computer Crime | back 35 -
Financial Attacks: Fraud, credit card theft, salami
attacks
-
Business Attacks: Corporate espionage
-
Military & Intelligence Attacks
-
Hacktivist Attacks: Politically motivated
hacking
-
Terrorist Attacks
-
Grudge Attacks
-
Thrill Attacks: For fun or bragging rights
-
Piracy of Intellectual Materials
-
Wire & Mail Fraud
|
| back 36 A secure communication path that ensures:
-
Tamper-resistant data
-
User awareness of authenticity
- Example:
SSL/TLS encryption
|
front 37
Types of IDPS (Detection/Prevention) | back 37
Network-Based IDPS:
- Scans network traffic for attacks or intrusions
Host-Based IDPS:
- Scans only the host it's installed on
Alternate Names for Host-Based IDPS:
- HBSS (Host-Based Security Solution)
- ESS (Endpoint
Security Solution)
- EDR (Endpoint Detection and
Response)
|
front 38
Why Use Both Network & Host-Based IDPS? | back 38 - Defense-in-Depth (layered security)
- Host-based detects
internal threats
- Network-based can't read encrypted
traffic
- Devices may be taken off-site
|
front 39
IDPS Scanning Technologies | back 39
Signature-Based (Pattern Matching / Knowledge-Based):
- Uses known attack signatures
- Detects known
threats
Behavior-Based (Anomaly-Based / Profile-Based):
- Learns normal behavior profiles
- Detects new
or unknown threats
- May use AI for analysis
- Requires secure environment during learning phase
|
| back 40
True Postive - correctly identifies an intrusion
True Negative - correctly identifies no intrusion
False Positive - mistakenly flags legitimate traffic
as intrusion
False Negative - fails to detect an actual intrusion |
| back 41
IDS Placement – Internet-Side of Firewall
Advantages:
- Sees most attacks unfiltered from the Internet
- Better
visibility into external attack types and frequency
- Can
detect misconfigured firewalls if attacks exit the network
IDS Placement – LAN-Side of Firewall
Advantages:
- Detects misconfigured firewalls if attacks enter the
network
- Better detection of insider threats
- Less
noise from external traffic → fewer false alarms
|
| back 42 Fake targets designed to lure attackers
Benefits:
- Protects real network
- Observes attacker behavior
- Acts as early-warning system
Honey-net:
A network of multiple honeypots |
| back 43 Sandboxed honeypot environment
Function:
Attacker is redirected here by IDS
- No harm can be done
- Used for safe observation
|
| back 44 Recover data in case of deletion, corruption, or alteration
3-2-1 Rule:
- 3 copies of critical files
- 2 backups on different
media
- 1 backup stored off-site
|
| back 45
Onsite Backup:
- Stored at same location as source
- Enables rapid
recovery
Offsite Backup:
- Stored at a different, remote location
- Protects
against local disasters
Cloud Backup (Electronic Vaulting):
- Scalable, high availability
- Pay-as-you-go model
|
| back 46 -
Normal (Full): Resets archive bit on all files
-
Incremental: Backs up files changed since last
backup
-
Differential: Backs up files changed since last
full backup
-
Crash and Restore: Used for full system
recovery
Example Schedule:
-
Monday: Full backup (file_a, file_b)
-
Tuesday: Incremental (file_c)
-
Wednesday: Incremental (file_d, file_e,
file_f)
-
Thursday: Differential
-
Friday: Crash and Restore
|
| back 47 A flag attached to each file that is turned on when the file is edited.
Used by:
Incremental and differential backups to determine which files to
back up. |
| back 48
To restore a system:
- Always need the latest full backup
- Need all incrementals since the last full
backup
- Only need the last differential if
using differential backups
Summary:
Latest full + last night’s + all incrementals in-between |
| back 49 - Encrypt backup tapes
- Physically protect tapes during
transport and storage
- Track first use-date and number of
uses (tapes degrade over time)
|
| back 50 -
Grandfather-Father-Son
-
Tower of Hanoi
-
Six Cartridge Weekly
Purpose:
Avoid overwriting important backups and maintain historical copies |
| back 51 -
Sensitive Files: Focus on
Confidentiality
-
Critical Files: Focus on Integrity
and Availability
- Backups support all
CIA elements
|
| back 52 Checking the starting and ending sectors of each partition
Tool Example:
chkdsk (Microsoft command-line utility) |
| back 53
Type: Striping
Disks: 2–32
Purpose: Performance
Fault Tolerance: ❌ Not fault-tolerant |
| back 54
Type: Mirroring
Disks: Exactly 2
Purpose: Fault tolerance
Performance: ❌ Not for performance |
| back 55
Type: Striping with Distributed Parity
Disks: Minimum 3
Purpose: Performance + Fault tolerance
Fault Tolerance: Can lose any 1 disk |
| back 56
Type: Striping with Distributed Parity
Disks: Minimum 4
Purpose: Performance + Fault tolerance
Fault Tolerance: Can lose any 2 disks |
| back 57
Type: Mirrored RAID 0 or Striped RAID 1
Purpose: Combines performance and fault tolerance |
front 58
NAS (Network Attached Storage) | back 58
Function: Local data storage and retrieval over LAN
Protocols: SMB/CIFS
Access: Direct user access |
front 59
SAN (Storage Area Network) | back 59
Function: Centralized storage for servers
Protocols: iSCSI, Fibre Channel, FCoE
Access: No direct user access; servers retrieve data |
| back 60
Function: Logical separation of a physical SAN
Analogy: Like VLANs for networks |
front 61
DLP (Data Loss Prevention) | back 61 Prevent sensitive data from leaving the organization
Types:
-
Network-based DLP: Scans outgoing data at the
perimeter
-
Host-based DLP: Prevents copying, printing, or
burning sensitive data on endpoints
|
| back 62
NAS (Network Attached Storage):
- Connected via LAN
- Used by laptops/workstations
- File-level access
- Easier to manage, lower cost
SAN (Storage Area Network):
- Connected via Fibre Channel (FC) switches
- Used by
servers
- Block-level access
- Higher performance, more
complex
|
front 63
Disaster Recovery Locations | back 63
Mirrored Site
- Full equipment
- Full data
-
MINS TO HOURS
Hot Site
-
Full equipment
-
HOURS TO 1 DAY
Warm Site
Cold Site
|
| back 64 - Also called mutual-aid agreement
- Two
organizations agree to be each other's disaster recovery site
|
| back 65 - Multiple live processing centers
- Used for
redundancy and
fault-tolerance
|
| back 66 -
Press Conference Site
-
Command Center Site
- Backup site should be:
- Far enough to avoid same
disaster
- Close enough for employee access
|
front 67
Resource Capacity Agreement | back 67 - Pre-arranged vendor agreements
- Ensures access to
resources post-disruption
|
front 68
Miscellaneous Planning Tips | back 68 - Use job titles in DRP, not names
- People change roles or leave the company
|
| back 69 - You call 5 people → they each call 5 more
- Ensures
rapid communication during disaster
|
front 70
Disaster Recovery vs. Restoration | back 70 -
Recovery = Over to backup site
(Memory trick: "recover" has
"over") -
Restoration = Back to original site
(Memory trick: "restore" has "OR" for
"original") |
| back 71 - Confirm incident is over
- Ensure safety of return
- Document losses (photos, insurance)
- Salvage assets
- Perform repairs/replacements
- Shut down alternate
site
- Conduct lessons
learned/post-mortem
|
| back 72 - Each department gets a copy of the DRP
- Run through a
checklist to verify coverage of relevant points
|
| back 73 - Representatives meet to discuss the plan
- No actual actions performed
|
| back 74 - Team physically walks to response locations
- Verbally
reviews each step for effectiveness
|
| back 75 - Practice drill
- Mobilize personnel to attempt reaching
RTO (Recovery Time Objective)
|
| back 76 - Run operations at alternate site in parallel
with production
|
| back 77 - Shut down production environment
- Run live operations
at alternate site
|
| back 78 -
Minimum: Once per year
- Also test when
significant changes are made
|
| back 79 - Update plan after major changes
- Include
version numbers on each copy
- Consider
setting an expiration date (e.g., 1 year)
|
| back 80 - Archive obsolete plans
- Collect old copies
- Confirm collection (e.g., serial numbers)
- Issue new
plans
- Destroy old plans
|
| back 81
Fail Open
- System opens access upon failure
- Prioritizes high
availability
- Example: Firewall fails and
allows all traffic
Fail Closed
- System blocks access upon failure
- Prioritizes confidentiality/security
- Example: Firewall fails and blocks all traffic
Fail Secure
- Fails into a pre-defined secure state
- Example: Doors lock when system fails
Fail Soft
- System enters reduced functionality
- Hibernates or saves data
- Terminates
non-essential functions
Fail Safe
- Prioritizes safety of people/property
- May compromise security
- Example: Doors
unlock during failure
Fail Over
- Switches to a hot backup site
- Ensures continuity of operations
|