Cybersecurity Quick Reference Sheet
Netstat: Shows network connection state
Nmap: Scans systems on a network (e.g., port 80)
Indicator of Compromise: Residual sign of a successful or ongoing attack
Dig: Command-line DNS lookup tool
NOT a Security Control Functional Type: Stateful
Trojan: Masquerades as legit software
Worm: Self-propagating standalone malware
Virus: Spreads by infecting other files
Backdoor: Bypasses authentication for access
Backup Solution: Corrective control
Locks on Doors: Physical control
Warning Signs: Deterrent control
Logs: Detective control
Digital Signature: Ensures authenticity, not encryption
Symmetric Properties: Same key for enc/dec, AES is example
APT or State Actor: High-skill, geopolitical motivation
Best Insider Threat: A Former Employee
CIA Triad: Confidentiality, Integrity, Availability
Whaling Targets: High-profile individuals (execs)
VLAN or WIFI: Somewhere You Are
Mouse Behavior: Something You Can Do
Friend Vouch: Someone You Know
ARP: Between Layer 2 & 3
IP: Layer 3
TCP: Layer 4
HTTP: Layer 7
Separation of Duties: Mitigates insider compromise
Least Privilege: Limits damage scope
Job Rotation: Prevents abuse, increases skill
Mandatory Vacation: Allows audit/review
IDS: Monitors, does NOT block
IPS: Monitors AND blocks
Firewall: Controls traffic with ACLs
SIEM: Aggregates logs, detects patterns
UNTRUE Offline Attack: Authorization
Obsolete Protocol: PAP
IDS in Labs: Suricata
UNTRUE Online Attack: Must use unencrypted protocol
Network Collection in Labs: Zeek
UNTRUE ARP Poisoning: Can't be protected against
Linux Password File: /etc/shadow
False Acceptance Rate: Biometric accepts intruder
Authentication: Proving identity
Max Downtime Allowed: Maximum Tolerable Downtime
Max Data Loss Time: Recovery Point Objective
Outage to Recovery Start: Recovery Time Objective
Recovery to Full Ops: Work Recovery Time
Yearly Event Probability: Annualized Rate of Occurrence
% Asset Loss in Event: Exposure Factor
Loss per Incident: Single Loss Expectancy
Annual Loss Estimate: Annualized Loss Expectancy
Backup Since Last Full: Differential
Load Balancer Redundancy: Network
Risk Response: Risk Mitigation/Remediation
Magnetic Wipe Method: Degaussing
EM Signal Blocker: Faraday Cage
Only Needed Data Collected: Data Minimization
Irreversible Data Scrub: Anonymization
Field Replaced w/ Token: Tokenization
Evidence Protection: Chain of Custody
Non-reversible Identifier: Hashing and Salting
Data Laws by Location: Data Sovereignty
Disk Imaging Cmd: dd