One Pager Cheat Sheet
- Common network protocols include TCP/IP used for
connection oriented communication, UDP used forconnectionless communication, HTTP forweb traffic, and FTP forfile transfers. - A firewall is a network security system that
monitors and controls network trafficbased on security rules, acting as a barrier between internal trusted networks and external untrusted networks, and works to filter traffic and block malicious attacks and intrusions. - Symmetric encryption uses the
same keyfor bothencryption and decryption, while asymmetric encryption uses apair of public and private keys. - A man-in-the-middle attack involves intercepting communications between two entities, and prevention typically involves using
SSL/TLS certificatesfrom trusted sources. - A denial of service attack aims to render a resource inaccessible by overloading it or exploiting vulnerabilities, with common types such as
buffer overflow,ping flood, andSYN floodattacks. - Ransomware operates by
encryptinga system's files and demanding a ransom for theirdecryption, often spreading via phishing emails or malicious website downloads. - Social engineering is the manipulation of individuals to reveal confidential information, using tactics such as
phishing,pretexting,baiting,quid pro quo, andtailgating. - The purpose of a vulnerability assessment is to scan networks and applications for security weaknesses, helping organizations to identify and prioritize vulnerabilities for
remediation. - The Advanced Encryption Standard (AES) encrypts data in
128-bit blocksusingsymmetric keys, employing multiple rounds of data transformations to convertplaintextintociphertext. - A firewall
monitors and controls trafficbased on predefined security rules, effectivelypreventing unauthorized accessand potential threats from malware. - Multifactor authentication (MFA) is important because it enhances security by requiring multiple verification methods, thus
reducing the utility of stolen credentials. - The CIA triad in cybersecurity stands for Confidentiality, Integrity, and Availability, representing the three pillars that guard against
unauthorized access,modification, andservice disruptions. - Risk management is vital in cybersecurity as it involves the recognition, assessment, and mitigation of cyber risks, ensuring efficient defense against threats and optimized resource allocation.
- A DDoS attack works by overburdening systems with excessive traffic from multiple sources, often utilizing
botnetsto intensify the impact. - Encryption transforms data into an unreadable format to ensure data confidentiality using popular algorithms like
AES,Blowfish,RSA, andSHA. - Multi-factor authentication (MFA) is important as it requires multiple credentials during login, providing a stronger defense by making
stolen credentialsless valuable to attackers. - A honeypot in cybersecurity is a
decoy systemdesigned toattract cyber attackers, divert their attention away from real assets, and provide insights into their tactics, techniques, and procedures. - Firewalls ensure network security by
regulating trafficbetween networks based on security rules, blocking unauthorized access and malware to allow only legitimate communication. - A DDoS attack
overwhelms systemsby flooding them withtraffic from many sources, often leveragingbotnets of compromised devicesto magnify the assault, with defenses includingupstream filteringandanti-DDoS services. - Penetration testing is a proactive measure where security experts emulate cyberattacks to assess an organization's defenses and identify vulnerabilities before they're exploited by
malicious actors. - A honeypot in cybersecurity is a
decoy systemused to attract, monitor cyber attacks, and improve defenses by gaining insights into the attackers' tactics, techniques, and procedures (TTPs). - To mitigate ransomware threats, it's crucial to
train users, keepsystems up-to-date,secure backups, useanti-malware software, andrestrict file execution. - You should use a virtual private network (VPN) to conceal your internet traffic and location—particularly when on public Wi-Fi or transmitting sensitive data—to protect against
eavesdropping. - SSL/TLS combats man-in-the-middle attacks by mandating
trusted certificatesfor establishingencrypted connections, ensuring secure communications between parties. - Firewalls control traffic between
internal and external networks, preventing unauthorized access and malware while allowing legitimate communication. - IP spoofing is a technique used by cyber attackers to disguise the actual source IP of network packets, enabling DDoS attacks,
firewallevasion, and concealment of identity. - A zero-day exploit targets
unknown vulnerabilities, posing a danger due to the possibility of widespread exploitation before patches are available, thus making swift responses crucial. - IPsec is a protocol that ensures secure networking by providing
encryption,integrity, andauthenticationat theIP packet level, commonly used inVPNsand for safeguarding internet communications. - The principle of least privilege is crucial as it
minimizes potential damagefrom errors or malicious actions by granting users only the permissions they need. - A virus is a specific type of malware that reproduces itself by
infectinghost files or disks, while malware refers to allmalicious softwaretypes, including viruses, worms, ransomware, and Trojans. - Infrastructure as code (IaC) uses
codeandautomation toolsfor consistent, reproducible infrastructure management and centralized security measures. - The zero trust model in cybersecurity operates on the assumption that breaches are inevitable, thus it verifies all connections, employs strict access controls,
isolation techniques, andencryptionto prevent unauthorized movement within systems. - A web application firewall (WAF) is a tool that
monitorsandfilters web trafficaccording to specific rules, providing protection against threats likecross-site scripting (XSS),SQL injection, andDDoS attacks. - OAuth enhances security by delegating authentication to trusted third parties, eliminating the need to store user credentials at multiple sites, and provides better encryption and limited access scopes compared to
password-based models. - A password spray attack involves attackers trying common passwords across multiple accounts, and countermeasures include enforcing strong, unique passwords, using
multi-factor authentication, and monitoringrepeated login failures. - Cross-site scripting (XSS) is a security risk that injects malicious scripts into web applications, which can be mitigated through measures like
input validation,data escaping, and usingCORS headers. - A brute force attack involves trying all possible password combinations to gain unauthorized access, which can be deterred by using
complex passwords, implementingaccount lockouts, and employingmulti-factor authentication. - Role-based access control (RBAC) bolsters security by limiting system access to necessary privileges, thereby reducing risk.
- A botnet is a
networkof compromised devices controlled by a remote attacker, often used for large-scale, coordinated attacks likedistributed denial of service (DDoS)attacks. - IPv4 uses
32-bitaddresses while IPv6 uses128-bitaddresses, thus providing a significantly largeraddressing capacity. - Two-factor authentication increases security by necessitating a second verification method like a one-time passcode, rendering
stolen passwordsless useful to attackers. - Personally identifiable information (PII) is data that can identify an individual, like names or social security numbers, and its protection is paramount to prevent
identity theftand other fraudulent activities. - A logic bomb is a
malicious codethat activates under specific conditions, which could be maliciously used to delete files when a certain employee's status changes. - A vulnerability disclosure program allows
ethical hackersto report security flaws they find, benefiting both the organization and these hackers, and enhancing overall cybersecurity. - Software-defined networking (SDN) enhances network security by using software to manage and configure network infrastructure dynamically, improving threat monitoring and allowing for swift configuration changes in response to threats.
- Session hijacking involves gaining unauthorized access to a system by taking over an existing user session, and preventive measures can include requiring
re-authenticationfor sensitive actions. - Data loss prevention (DLP) solutions monitor and control data transfers to prevent unauthorized data exposure or breaches, by identifying and protecting sensitive information to ensure it doesn't leave the network without
proper authorization. - A Security Information and Event Management (SIEM) system collects and analyzes log data from an organization's infrastructure to detect security incidents, monitor potential threats, and facilitate a rapid response to security breaches.
- Salting a hash enhances security by adding random data to a password prior to
hashingit, ensuring varying hashes for identical passwords and thereby preventing rainbow table attacks. - In a buffer overflow attack, an attacker overloads a
bufferwith excessive data, potentially causing system crashes or enabling the execution ofmalicious code, but such attacks can be prevented with properbounds checkingandinput validationin software development. - Credential stuffing is the process of using stolen
username-passwordpairs for unauthorized account access, which can be prevented via enforcement of strong password policies, use of multi-factor authentication, and monitoring for repeated failed login attempts. - A database firewall contributes to security by monitoring and controlling traffic to and from a database based on specific rules, thereby protecting databases against threats like
SQL injectionandunauthorized access. - The AAA framework in cybersecurity involves
authentication(verifying a user's identity),authorization(determining their system permissions), andaccounting(recording their activities). - DNSSEC enhances the security of the Domain Name System (DNS) by adding
cryptographic signaturesto DNS data, ensuring data integrity and source authentication to prevent DNS spoofing. - The objective of a vulnerability scanner in application security is to proactively identify and rectify potential security flaws like
SQL injectionorcross-site scripting vulnerabilitiesbefore they can be exploited. - The Public Key Infrastructure (PKI) provides a framework for secure digital transactions and communications by establishing trusted digital identities through
certificate authoritiesandkey pairs. - A proxy server enhances privacy and security by acting as an intermediary between users and websites, filtering and monitoring traffic, blocking access to malicious websites, and masking users' IP addresses.
- Data classification is essential for cybersecurity as it categorizes data based on its sensitivity, aiding organizations in applying
appropriate security measuresproportional to the data's risk level. - Anomaly detection in cybersecurity is the identification of unusual patterns or behaviors in data or network traffic, which may signify potential threats or cyberattacks.
- Continuous Integration/Continuous Deployment (CI/CD) automates software development, which aids in security practices such as
static and dynamic analysis,infrastructure as code, and quickvulnerability patching. - OAuth enhances secure delegated access by allowing third-party applications to access user data without storing user credentials, instead using
tokensto grant time-limited access rights. - In the context of disaster recovery, the Recovery Point Objective (RPO) signifies the
maximum acceptable data loss, and the Recovery Time Objective (RTO) denotes themaximum acceptable downtime. - Bidirectional encryption uses a common
private keyfor both encryption and decryption, typically used in scenarios like encrypted communications between IoT devices and chat applications. - Cryptographic hash functions support cybersecurity by producing a fixed-size hash value from variable-length input, crucial for digital signatures, password storage, data integrity checks, and message authentication, thereby ensuring data security and integrity.
- The blue team in cybersecurity is responsible for actively monitoring, detecting, analyzing, and responding to potential
cybersecurity threatsandincidentswithin an organization. - Endpoint Detection and Response (EDR) solutions continuously monitor endpoint devices for potential threats, offering greater visibility and facilitating early threat detection and automated response mechanisms.
- IPsec provides secure networking by offerinng
encryption,authentication, andintegrityat the IP packet level, typically used in Virtual Private Networks (VPNs) to ensure secure communications over potentially insecure networks. - A REST API provides web services using JSON over HTTP, and its security risks, including
injectionandbroken authentication, can be mitigated using input validation, proper authentication mechanisms, rate limiting, and regular vulnerability scanning. - A storage area network (SAN) is a
high-speed, dedicated networkthat provides access toblock-level storage, and its centralized nature enhances data security through easier implementation of encryption and access control. - A password spray attack is a method where common passwords are quickly tried across multiple accounts, and can be defended against through
rate limiting,multifactor authentication, and the use of strong unique passwords per user. - A Public Key Infrastructure (PKI) uses
certificate authorities,public/private keys, anddigital signaturesto establish trusted digital identities and secure connections and documents. - A proxy is an intermediary for client requests to servers that can
filter traffic,block accessto malicious sites, andconceal internal IP addresses.


