Print Options

Card layout: ?

← Back to notecard set|Easy Notecards home page

Instructions for Side by Side Printing
  1. Print the notecards
  2. Fold each page in half along the solid vertical line
  3. Cut out the notecards by cutting along each horizontal dotted line
  4. Optional: Glue, tape or staple the ends of each notecard together
  1. Verify Front of pages is selected for Viewing and print the front of the notecards
  2. Select Back of pages for Viewing and print the back of the notecards
    NOTE: Since the back of the pages are printed in reverse order (last page is printed first), keep the pages in the same order as they were after Step 1. Also, be sure to feed the pages in the same direction as you did in Step 1.
  3. Cut out the notecards by cutting along each horizontal and vertical dotted line
To print: Ctrl+PPrint as a list

81 notecards = 21 pages (4 cards per page)

Viewing:

Domain 7: Security Operations

front 1

IT Asset Management (ITAM)

back 1

  • Database of all IT assets
  • Includes firmware, software versions, locations, and ownership

front 2

Configuration Management Database (CMDB)

back 2

  • Central repository of asset configurations and settings
  • Works with ITAM
  • CI (Configuration Item): Individual entry in the CMDB

front 3

Privileged Users in IT

back 3

Includes:

  • System admins
  • Network admins
  • Security admins
  • DB admins
  • Help-desk
  • Custodians
  • Operators (legacy term for sys admins)

Supervisor Responsibilities:

  • Supervision (preventative)
  • Training & Awareness (detective)
  • Monitoring (detective – trust but verify)

front 4

Zero-Day Vulnerability

back 4

  • Attack occurs shortly after a vulnerability is discovered
  • No vendor fix available yet, or fix is brand-new and not installed

front 5

Incident Response Terminology

back 5

  • Event: Observable occurrence
  • Hazard: Precondition that could lead to an event
  • Incident: Adverse occurrence or policy violation

front 6

CIRT (Cyber Incident Response Team)

back 6

  • IRT (Incident Response Team)
  • CSIRT (Computer Security Incident Response Team)

front 7

Basic Incident Response Phases

back 7

  1. Detection and Triage
  2. Investigation
  3. Containment
  4. Analysis & Tracking
  5. Mitigation
  6. Recovery & Repair

front 8

(ISC)² Incident Response Phases

back 8

  • Detection
  • Response
  • Mitigation
  • Reporting
  • Recovery
  • Remediation
  • Lessons Learned

front 9

SANS Incident Response Phases

back 9

  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Lessons Learned

front 10

Logging an Incident

back 10

  • User-ID
  • Time & Date
  • Event Description
    Note:
    User's name is less important (may not be unique)

front 11

Threat Intelligence

back 11

Knowledge about current and emerging threats to help prevent or mitigate cyberattacks.
Sources:

  • Cybersecurity newsletters
  • Conferences
  • Social media
  • Dark Web research

front 12

UEBA (User and Entity Behavior Analytics)

back 12

Analyzing network activity to detect anomalous behavior.
Targets:

  • Insider threats
  • Compromised accounts
    Observes:
  • User behavior
  • Device usage
  • Security events

front 13

SOAR (Security Orchestration, Automation, and Response)

back 13

Term coined by Gartner to describe tools that automate repetitive security tasks.

Benefits:

  • Faster incident response
  • Increased team productivity
  • Improved efficiency

front 14

Software-Defined Security

back 14

Security model managed through policy-driven software.

Features:

  • Automates and monitors controls like IDS, network segmentation, and access controls
  • Centralized management of security infrastructure

front 15

SIEM (Security Information and Event Management)

back 15

Splunk, SolarWinds, Datadog

Function:

  • Aggregates and correlates logs from multiple sources
  • Helps security managers understand the IT environment and detect threats

front 16

SIEM Tuning

back 16

Reduce false positives without increasing false negatives.

Benefit:
Minimizes analyst fatigue and improves alert quality

front 17

Audit Log Reduction Tools

back 17

  • Clipping Levels: Only record violations above a set threshold
  • Event Filtering: Focus on significant events that require attention

front 18

Dr. Edmond Locard

back 18

Pioneer in forensic science
Locard’s Principle of Exchange:

  • Criminals bring something into the scene
  • Criminals leave with something from the scene
    Key Idea: Every encounter leaves a trace

front 19

Suspect Narrowing Strategy

back 19

Mnemonic: M.O.M.

  • Means – Did the suspect have the tools or ability?
  • Opportunity – Was the suspect present or able to commit the act?
  • Motive – Did the suspect have a reason?

front 20

Hearsay

back 20

Evidence based on what the witness was told, not what they personally know.

Note:
Not normally admissible in court.

front 21

Chain-of-Custody

back 21

Chronological documentation of evidence handling.

Must Track:

  • Who had the evidence
  • When it was handled
  • How it was protected
    Stages:
    Identification, Gathering, Protection, Access, Presentation

front 22

Interviewing

back 22

Discover what happened.

Method:

  • Gather info from witnesses and victims
  • Resolve conflicting stories and timelines

front 23

Interrogation

back 23

Obtain testimony or confession to be used as evidence in trial.

front 24

Expert Witness

back 24

Educates the jury on specialized topics.

Use:
Can be presented as evidence.

front 25

Evidence Admissibility Rules

back 25

Mnemonic: S.T.R.I.C.

  • S: No unlawful Search & Seizure
  • T: Evidence must be Trustworthy & Reliable
  • R: Evidence must be Relevant to the case
  • I: Proper Identification and Protection
  • C: Maintain Chain of Custody

front 26

Evidence Lifecycle

back 26

  1. Discovery
  2. Protection
  3. Recording
  4. Collection and Identification
  5. Analysis
  6. Storage, Transportation, Preservation
  7. Present in Court
  8. Return to Owner

front 27

Capturing Digital Evidence

back 27

Start from volatile forms, then move to persistent forms.

front 28

Order of Volatility (OOV)

back 28

  1. Live system info (RAM, process list, unsaved work, encryption keys)
  2. Virtual memory (paging/swap/temp files)
  3. Physical media (hard drives, DVDs, USBs, printouts)
  4. Backups & networks (backup media, servers, log files, cloud storage)

front 29

Hard Drive Analysis Process

back 29

  1. Install write-blocker (Forensic Disk Controller)
  2. Hash the drive
  3. Create forensic bit-level images
  4. Hash the images to verify integrity
  5. Use images for analysis

front 30

Slack Space

back 30

Disk areas with lingering data from deleted files.

Forensics Tip:
Inspect slack space for hidden data fragments.

front 31

Common Types of Evidence

back 31

  • Direct/Testimony: Witness statements
  • Real/Physical: Objects proving/disproving guilt
  • Documentary: Records, photos, manuals
  • Digital: Emails, backups, browser history
    • ⚠️ Less reliable due to tampering risks
  • Demonstrative: Models, timelines, re-enactments

front 32

Types of Evidence (Legal Definitions)

back 32

  • Conclusive: Irrefutable, cannot be contradicted
  • Corroborative: Supports existing evidence
  • Circumstantial: Implies facts without direct proof

front 33

Types of Digital Forensics

back 33

1. Media Analysis:

  • Examines computers, storage devices, printers, faxes, smartphones, data, files, photos, recycle-bin, etc.

2. Software Analysis:

  • Examines applications and their output
  • Analyzes malware and its consequences

3. Network Analysis:

  • Examines logs, ISP logs, tools used, and affected devices
  • Traces email headers to locate sources

front 34

Legal Terms in Digital Forensics

back 34

  • Legal Hold: Notice to preserve relevant evidence
  • eDiscovery: Locating and securing electronic evidence for trial
  • Search Warrant: Court order for search and seizure
  • Subpoena: Legal order for witness or evidence submission
  • Wire Tapping: Eavesdropping on communications (requires warrant or consent)

front 35

Categories of Computer Crime

back 35

  • Financial Attacks: Fraud, credit card theft, salami attacks
  • Business Attacks: Corporate espionage
  • Military & Intelligence Attacks
  • Hacktivist Attacks: Politically motivated hacking
  • Terrorist Attacks
  • Grudge Attacks
  • Thrill Attacks: For fun or bragging rights
  • Piracy of Intellectual Materials
  • Wire & Mail Fraud

front 36

Trusted Path

back 36

A secure communication path that ensures:

  1. Tamper-resistant data
  2. User awareness of authenticity
    • Example: SSL/TLS encryption

front 37

Types of IDPS (Detection/Prevention)

back 37

Network-Based IDPS:

  • Scans network traffic for attacks or intrusions

Host-Based IDPS:

  • Scans only the host it's installed on

Alternate Names for Host-Based IDPS:

  • HBSS (Host-Based Security Solution)
  • ESS (Endpoint Security Solution)
  • EDR (Endpoint Detection and Response)

front 38

Why Use Both Network & Host-Based IDPS?

back 38

  • Defense-in-Depth (layered security)
  • Host-based detects internal threats
  • Network-based can't read encrypted traffic
  • Devices may be taken off-site

front 39

IDPS Scanning Technologies

back 39

Signature-Based (Pattern Matching / Knowledge-Based):

  • Uses known attack signatures
  • Detects known threats

Behavior-Based (Anomaly-Based / Profile-Based):

  • Learns normal behavior profiles
  • Detects new or unknown threats
  • May use AI for analysis
  • Requires secure environment during learning phase

front 40

IDPS Detection Outcomes

back 40

True Postive - correctly identifies an intrusion

True Negative - correctly identifies no intrusion

False Positive - mistakenly flags legitimate traffic as intrusion

False Negative - fails to detect an actual intrusion

front 41

IDS Placement Scenarios

back 41

IDS Placement – Internet-Side of Firewall

Advantages:

  • Sees most attacks unfiltered from the Internet
  • Better visibility into external attack types and frequency
  • Can detect misconfigured firewalls if attacks exit the network

IDS Placement – LAN-Side of Firewall

Advantages:

  • Detects misconfigured firewalls if attacks enter the network
  • Better detection of insider threats
  • Less noise from external traffic → fewer false alarms

front 42

Honeypot / Honey-net

back 42

Fake targets designed to lure attackers

Benefits:

  • Protects real network
  • Observes attacker behavior
  • Acts as early-warning system
    Honey-net:
    A network of multiple honeypots

front 43

Padded Cell

back 43

Sandboxed honeypot environment

Function:
Attacker is redirected here by IDS

  • No harm can be done
  • Used for safe observation

front 44

Backup Strategy

back 44

Recover data in case of deletion, corruption, or alteration

3-2-1 Rule:

  • 3 copies of critical files
  • 2 backups on different media
  • 1 backup stored off-site

front 45

Backup Types

back 45

Onsite Backup:

  • Stored at same location as source
  • Enables rapid recovery

Offsite Backup:

  • Stored at a different, remote location
  • Protects against local disasters

Cloud Backup (Electronic Vaulting):

  • Scalable, high availability
  • Pay-as-you-go model

front 46

Backup Types & Schedule

back 46

  • Normal (Full): Resets archive bit on all files
  • Incremental: Backs up files changed since last backup
  • Differential: Backs up files changed since last full backup
  • Crash and Restore: Used for full system recovery

Example Schedule:

  • Monday: Full backup (file_a, file_b)
  • Tuesday: Incremental (file_c)
  • Wednesday: Incremental (file_d, file_e, file_f)
  • Thursday: Differential
  • Friday: Crash and Restore

front 47

Archive Bit

back 47

A flag attached to each file that is turned on when the file is edited.

Used by:
Incremental and differential backups to determine which files to back up.

front 48

Backup Restoration Rules

back 48

To restore a system:

  • Always need the latest full backup
  • Need all incrementals since the last full backup
  • Only need the last differential if using differential backups

Summary:
Latest full + last night’s + all incrementals in-between

front 49

Media Management Tips

back 49

  • Encrypt backup tapes
  • Physically protect tapes during transport and storage
  • Track first use-date and number of uses (tapes degrade over time)

front 50

Tape Rotation Schemes

back 50

  • Grandfather-Father-Son
  • Tower of Hanoi
  • Six Cartridge Weekly

Purpose:
Avoid overwriting important backups and maintain historical copies

front 51

File Sensitivity & CIA

back 51

  • Sensitive Files: Focus on Confidentiality
  • Critical Files: Focus on Integrity and Availability
  • Backups support all CIA elements

front 52

Disk Check

back 52

Checking the starting and ending sectors of each partition

Tool Example:
chkdsk (Microsoft command-line utility)

front 53

RAID 0

back 53

Type: Striping
Disks: 2–32
Purpose: Performance
Fault Tolerance: ❌ Not fault-tolerant

front 54

RAID 1

back 54

Type: Mirroring
Disks: Exactly 2
Purpose: Fault tolerance
Performance: ❌ Not for performance

front 55

RAID 5

back 55

Type: Striping with Distributed Parity
Disks: Minimum 3
Purpose: Performance + Fault tolerance
Fault Tolerance: Can lose any 1 disk

front 56

RAID 6

back 56

Type: Striping with Distributed Parity
Disks: Minimum 4
Purpose: Performance + Fault tolerance
Fault Tolerance: Can lose any 2 disks

front 57

RAID 10 (1+0)

back 57

Type: Mirrored RAID 0 or Striped RAID 1
Purpose: Combines performance and fault tolerance

front 58

NAS (Network Attached Storage)

back 58

Function: Local data storage and retrieval over LAN
Protocols: SMB/CIFS
Access: Direct user access

front 59

SAN (Storage Area Network)

back 59

Function: Centralized storage for servers
Protocols: iSCSI, Fibre Channel, FCoE
Access: No direct user access; servers retrieve data

front 60

VSAN (Virtual SAN)

back 60

Function: Logical separation of a physical SAN
Analogy: Like VLANs for networks

front 61

DLP (Data Loss Prevention)

back 61

Prevent sensitive data from leaving the organization

Types:

  • Network-based DLP: Scans outgoing data at the perimeter
  • Host-based DLP: Prevents copying, printing, or burning sensitive data on endpoints

front 62

NAS vs SAN Overview

back 62

NAS (Network Attached Storage):

  • Connected via LAN
  • Used by laptops/workstations
  • File-level access
  • Easier to manage, lower cost

SAN (Storage Area Network):

  • Connected via Fibre Channel (FC) switches
  • Used by servers
  • Block-level access
  • Higher performance, more complex

front 63

Disaster Recovery Locations

back 63

Mirrored Site

  • Full equipment
  • Full data
  • MINS TO HOURS

Hot Site

  • Full equipment
  • HOURS TO 1 DAY

Warm Site

  • Some equipments
  • DAYS

Cold Site

  • No equipment
  • WEEKS+

front 64

Reciprocal Agreement

back 64

  • Also called mutual-aid agreement
  • Two organizations agree to be each other's disaster recovery site

front 65

Dual Sites

back 65

  • Multiple live processing centers
  • Used for redundancy and fault-tolerance

front 66

Other Sites to Plan For:

back 66

  1. Press Conference Site
  2. Command Center Site
  • Backup site should be:
    • Far enough to avoid same disaster
    • Close enough for employee access

front 67

Resource Capacity Agreement

back 67

  • Pre-arranged vendor agreements
  • Ensures access to resources post-disruption

front 68

Miscellaneous Planning Tips

back 68

  • Use job titles in DRP, not names
  • People change roles or leave the company

front 69

Call-Tree / Call-List

back 69

  • You call 5 people → they each call 5 more
  • Ensures rapid communication during disaster

front 70

Disaster Recovery vs. Restoration

back 70

  • Recovery = Over to backup site
    (Memory trick: "recover" has "over")
  • Restoration = Back to original site
    (Memory trick: "restore" has "OR" for "original")

front 71

Restoration Steps

back 71

  • Confirm incident is over
  • Ensure safety of return
  • Document losses (photos, insurance)
  • Salvage assets
  • Perform repairs/replacements
  • Shut down alternate site
  • Conduct lessons learned/post-mortem

front 72

Checklist / Desk-Check

back 72

  • Each department gets a copy of the DRP
  • Run through a checklist to verify coverage of relevant points

front 73

Table-Top Review

back 73

  • Representatives meet to discuss the plan
  • No actual actions performed

front 74

Structured Walk-Through

back 74

  • Team physically walks to response locations
  • Verbally reviews each step for effectiveness

front 75

Simulation Test

back 75

  • Practice drill
  • Mobilize personnel to attempt reaching RTO (Recovery Time Objective)

front 76

Parallel Test

back 76

  • Run operations at alternate site in parallel with production

front 77

Full-Interruption Test

back 77

  • Shut down production environment
  • Run live operations at alternate site

front 78

DRP Testing Frequency

back 78

  • Minimum: Once per year
  • Also test when significant changes are made

front 79

DRP Miscellaneous

back 79

  • Update plan after major changes
  • Include version numbers on each copy
  • Consider setting an expiration date (e.g., 1 year)

front 80

Version Control for DRP

back 80

  1. Archive obsolete plans
  2. Collect old copies
  3. Confirm collection (e.g., serial numbers)
  4. Issue new plans
  5. Destroy old plans

front 81

Failure Modes

back 81

Fail Open

  • System opens access upon failure
  • Prioritizes high availability
  • Example: Firewall fails and allows all traffic

Fail Closed

  • System blocks access upon failure
  • Prioritizes confidentiality/security
  • Example: Firewall fails and blocks all traffic

Fail Secure

  • Fails into a pre-defined secure state
  • Example: Doors lock when system fails

Fail Soft

  • System enters reduced functionality
  • Hibernates or saves data
  • Terminates non-essential functions

Fail Safe

  • Prioritizes safety of people/property
  • May compromise security
  • Example: Doors unlock during failure

Fail Over

  • Switches to a hot backup site
  • Ensures continuity of operations