πŸ”“Principles of Security

Learn the principles of information security that secures data and protects systems from abuse

https://tryhackme.com/room/principlesofsecurity
Room Attributes
Value

Subscription Required

False [Free]

Type

Walkthrough

Difficulty

Info

Tags

CIA Triad, Information Security, Incident Response, Threat Model

Task 1 Introduction

Let's proceed!

Task 2 The CIA Triad

What element of the CIA triad ensures that data cannot be altered by unauthorised people?

Reveal Flag 🚩

🚩integrity

What element of the CIA triad ensures that data is available?

Reveal Flag 🚩

🚩availability

What element of the CIA triad ensures that data is only accessed by authorised people?

Reveal Flag 🚩

🚩confidentiality

Task 3 Principles of Privileges

What does the acronym "PIM" stand for?

Reveal Flag 🚩

🚩Privileged Identity Management

What does the acronym "PAM" stand for?

Reveal Flag 🚩

🚩Privileged Access Management

If you wanted to manage the privileges a system access role had, what methodology would you use?

Reveal Flag 🚩

🚩PAM

If you wanted to create a system role that is based on a users role/responsibilities with an organisation, what methodology is this?

Reveal Flag 🚩

🚩PIM

Task 4 Security Models Continued

What is the name of the model that uses the rule "can't read up, can read down"?

Reveal Flag 🚩

🚩The Bell-LaPadula Model

What is the name of the model that uses the rule "can read up, can't read down"?

Reveal Flag 🚩

🚩The Biba Model

If you were a military, what security model would you use?

Reveal Flag 🚩

🚩The Bell-LaPadula Model

If you were a software developer, what security model would the company perhaps use?

Reveal Flag 🚩

🚩The Biba Model

Task 5 Threat Modelling & Incident Response

What model outlines "Spoofing"?

https://web.archive.org/web/20070303103639/http://msdn.microsoft.com/msdnmag/issues/06/11/ThreatModeling/default.aspx
Reveal Flag 🚩

🚩STRIDE

What does the acronym "IR" stand for?

Reveal Flag 🚩

🚩Incident Response

You are tasked with adding some measures to an application to improve the integrity of data, what STRIDE principle is this?

Reveal Flag 🚩

🚩Tampering

An attacker has penetrated your organisation's security and stolen data. It is your task to return the organisation to business as usual. What incident response stage is this?

Reveal Flag 🚩

🚩Recovery

Last updated