OpSec Cheatsheet
This site is a reference for Operational Security (OPSEC)
Operations Security deals with identification of critical information, analysis of threats, analysis of vulnerabilities, assessment of risks and application of appropriate OpSec measures. This page concerns itself mainly with the latter alongside preventive measuers.
Facebook exemplifies the axiom that if a product is free, you aren’t the customer. You are the product.
- Micahel Bazzell
Phishing is type of social engineering attack. It occurs when an attacker masquerading as a trusted entity dupes a victim into opening an email, clicking a link or sharing sensitive information
Protection against cracking and bruteforce attacks
A practice dating back many years.
An attack vector is a threat-surface upon which an attacker may exploit a target device
Parts of the Internet that run on seperate networks/protocols and thus are not indexed by regular search engines.
SSH (Secure Shell) is a protocol used for secure remote access
VPN (Virtual Private Network) provides privacy, anonymity and security to users by creating a connection to a private network across a public network like the Internet
Command | Description | ||
---|---|---|---|
Logfiles | Be aware if your provider saves logfiles or not (they might have their hand forced at some point if they do), or just assume all communication is secretly tapped. |
Drive storage refers to the physical storage of information on personal computers, laptops or phones
These alliances share sensitive information with each other. Sensitive information could for example be regular requests of VPN log files from service provider.