Show Menu
Cheatography

Cyber Security for Total Idiots Cheat Sheet (DRAFT) by

Cyber Security 101 for total idiots and noobs

This is a draft cheat sheet. It is a work in progress and is not finished yet.

Core Security Principles

Confid­ent­iality: Ensure only AUTHORIZED USERS CAN ACCESS RESOURCES.
Integrity: Ensures DATA IS ACCURATE AND UNMODI­FIED.
Availa­bility: Ensures resources are AVAILABLE FOR AUTHORIZED USERS.
Non-Re­pud­iation: Users CANNOT deny that they something when there's proof they did. (e.g., logs)
Defense in Depth
Implem­enting multiple layers of security controls to protect assets. If one control fails, others are in place to prevent breaches.
Least Privilege
Granting users only the minimum level of access required to perform their job duties.
Zero Trust
"­Never Trust, Always Verify­". Treat every connection attempt as a potential threat
 

Core Security Principles

Authen­tic­ation, Author­ization and Accoun­tab­ility
Authen­tic­ation: Validate the identity of the user.
Types of Authen­tic­ation
Single factor authen­tic­ation
One method of authen­tic­ation. (Username + Password)
Multi Factor Authen­tic­ation
Requiring two or more verifi­cation factors (something you know, something you have, something you are) to access resources.
Authen­tic­ation Techniques
Type 1: Something you know
PIN or Passwords
Type 2: Something you have
Tokens, Smart Cards
Type 3: Something you are
Biometrics
Author­iza­tion: Grants the user rights based on their role
Accoun­ting: Audits log access