Professional Documents
Culture Documents
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
TPM provides the use and storage of cryptographic keys, certificates, and hashing values
Endorsement Key (EK) is created by the hardware manufacturer (public and private keys)
Storage Root Key (SRK) secures the keys stored in the TPM
Memory stores data for direct and immediate use by a computing devices
Volatile Memory: memory storage will be lost if power is lost
Non-Volatile Memory: memory storage is maintained if power is lost
Read Only Memory (ROM) is non-volatile storage
Random Access Memory (RAM) is volatile storage
Programmable Read-Only Memory (PROM) cannot be erased
Erasable Programmable Read-Only Memory (EPROM) requires removal and ultraviolet light to erase data
Electronically Erasable Programmable Read-Only Memory (EEPROM) can be erased without the removal
Flash Memory is non-volatile memory used in most mobile computing devices
Firmware is software stored inside a ROM memory chip
Static RAM (SRAM) provides quicker access to data
Dynamic RAM (DRAM) uses capacitors to hold a charge for access to data
Synchronous DRAM (SDRAM) synchronized with the clock speed
Double data rate SDRAM (DDR SDRAM) can improve memory clock speed to at least 200 MHz
Non-Volatile RAM (NVRAM) retains its data if power is lost. Also called SRAM (static random-access memory cells)
Cache memory is used to increase processing speeds
Primary Memory is volatile and can’t store data permanently (Primary storage or main memory)
Secondary Memory is non-volatile memory and stores and retains data
Memory isolation is a requirement for multilevel security mode systems
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
OSI Model
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
A protocol that spans across multiple layers of the TCP/IP or OSI stack
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
Multilayer protocols spans across multiple layers of the TCP/IP or OSI stack
TCP and DNP3 are the 2 main multilayer protocols
DNP3 is ICS protocol used for SCADA that connects the RTU to the MCS
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
DNS Hijacking attack uses a hijacked DNS server to send a victim to a spoofed webpage
DNSSEC Preventing forged DNS records by requiring digital signatures
DNS architecture places servers in strategic places, using zones, and filtering communications
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
Stratum 0 is most accurate time source, using GPS signals or atomic clocks. Also called reference timing or reference
clock
Stratum 1 is synched within a few microseconds of a stratum 0 source
NTP uses UDP port 123 for time synchronization
NTP Security: Use the same time source for all components
Use NTPv3 or higher for authentication
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.
Module 3: Systems And Network Security
Screened host uses an external router and sends traffic to a dual-homed firewall or bastion host
Screened subnet creates a DMZ using 2 different firewalls
Three Tier Architecture contains 2 or more screened subnets
Keeping operating system up to date with patching
Review firewall audit logs frequently to detect issues
Review firewall rulesets/ACLs periodically to tune the firewall
© Copyright 2018 Cyberactive Security, LLC. All Rights Reserved. CISSP is a registered trademark of (ISC)2, Inc.