This diagram summarizes what I’ve learned these years in the Cybersecurity arena. I hope it helps in practice and the journey of CISSP. It defines assets from the perspective of information systems (the peacock), aligns with the ISC2 control types mentioned in OSG, and incorporates GRC, business mindset, and cultural awareness.
A USB Type-C connector has twelve pins. Four pairs of pins, aka “lanes,” are used to transmit (TX) and receive (RX) data, as highlighted in the following diagram by Eaton.
Both USB 3.0 (5 Gbps) and USB 3.1 (10 Gbps) can use the Type-C connector but only one TX lane and one RX lane, depending on the orientation of the connector. USB 3.2 takes advantage of all four lanes to achieve a 20 Gbps data rate.
IPsec provides security services through AH and ESP. The two IPsec peers establish security associations for key exchange and security services by the Internet Key Exchange (IKE) protocol. RFC 2409 specifies the Internet Key Exchange Protocol (IKEv1), while RFC 7296 defines the Internet Key Exchange Protocol Version 2 (IKEv2).
Security Associations for Key Exchange
In IKEv1, the ISAKMP SA is two-way or bi-directional:
The ISAKMP SA is bi-directional. That is, once established, either party may initiate Quick Mode, Informational, and New Group Mode Exchanges.
Both AH and ESP security associations (one-way, either inbound or outbound) are established based on the IKE security association. In IKEv2, SAs established based on IKE SA are called Child SAs.
SA (Security Association): a one-way (inbound or outbound) agreement between two communicating peers that specifies the IPsec protections to be provided to their communications. This includes the specific security protections, cryptographic algorithms, and secret keys to be applied, as well as the specific types of traffic to be protected.
In IKE v1, ISAKMP defines “phases,” while Oakley defines “modes.” Security association negotiation happens in each mode, e.g., Main Mode, Aggressive Mode, and Quick mode.
In phase 1, a bi-directional secure, authenticated channel, aka ISAKMP security association (SA), is established between the two peers. Either “Main Mode” or “Aggressive Mode” is used in phase 1 to do so.
In phase 2, a one-way security association for AH or ESP is established using the “Quick Mode.”
For a successful and secure communication using IPsec, the Internet Key Exchange (IKE) protocols take part in a two-step negotiation. Main mode or Aggressive mode (within Phase 1 negotiation) authenticate and/or encrypt the peers. Quick mode (Phase 2) negotiates the algorithms and agree on which traffic will be sent across the VPN. Let’s take a further look at Quick mode phase (Phase 2) and what it’s role is within an IPsec VPN tunnel.
According to NIST SP 800-30 R1, “assessing risk requires the careful analysis of threat and vulnerability information to determine the extent to which circumstances or events could adversely impact an organization and the likelihood that such circumstances or events will occur.” Which of the following should be determined first before conducting a risk assessment? (Wentz QOTD) A. Risk assessment methodology B. Analysis approach C. Assessment approach D. Analytic approach
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
You are conducting a risk assessment based on NIST SP 800-30 R1, in which adversarial threat events are expressed as tactics, techniques, and procedures (TTPs). Which of the following risk factors best describes an adversarial threat event? (Wentz QOTD) A. Fire at the primary facility B. Compliance with technical standards C. Perform network sniffing of exposed networks D. Inability to perform current missions/business functions
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
According to NIST SP 800-30 R1, risk models define the risk factors to be assessed and the relationships among those factors. Risk factors are characteristics used in risk models as inputs to determining levels of risk in risk assessments. Which risk factor is not mentioned in the NIST generic risk model? (Wentz QOTD) A. Security posture B. Predisposing conditions C. Likelihood of the success of a threat event D. Likelihood of a threat source Initiating a threat event
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.