Professional Documents
Culture Documents
a. Detective
b. Directive
c. Deter
d. Compensating
e. Control
f. Preventative
g. Recovery
a. Detect
b. Respond
c. Mitigate
d. Report
e. Remediate
f. Recover
g. Lessons Learned
1. Data Lifecycle
a. Create
b. Store
c. Use
d. Share
e. Archive
f. Destroy
a. Initial
b. Repeatable
c. Defined
d. Managed
e. Optimized
1. i. DataGram
2. ii. DataStream
3. iii. Session
4. iv. Packets
5. v. Frames
6. vi. Bits
7. Microsoft Threat Model
a. Spoofing
b. Tampering
c. Repudiation
d. Information Disclosure
e. DDoS
f. Elevation of Privileges
1. Language Generations 1 – 5
a. 1 is CPU language
b. 3 is .NET / C++ / C / etc
c. 5 is Natural Linguistics
1. Security Assertion Markup Language
a. Identity Provider
b. User Principals
c. Service Provider
d. Attributes
e. Bindings
f. Profile
g. Protocol
h. Authorization
i. Authentication
1. OAuth
a. User Resource
b. Relay Resource
c. Application Client
d. No Credentials
a. Ashes – Material
b. Boils – Liquids
c. Charge (E for UK) - Electrical
d. Dense - Metals
e. Kitchen
1. Security Modes
a. Dedicated – All
b. System High
c. Compartmented
d. Multilevel – Only
1. Biometric Accept/Reject
a. Request
b. Review
c. Authorize
d. Test
e. Schedule
f. Deploy
1. Security Access Controls