πPrinciples of Security
Learn the principles of information security that secures data and protects systems from abuse
Room Attributes
Value
Task 1 Introduction
Let's proceed!
Task 2 The CIA Triad
What element of the CIA triad ensures that data cannot be altered by unauthorised people?
What element of the CIA triad ensures that data is available?
What element of the CIA triad ensures that data is only accessed by authorised people?
Task 3 Principles of Privileges
What does the acronym "PIM" stand for?
What does the acronym "PAM" stand for?
If you wanted to manage the privileges a system access role had, what methodology would you use?
If you wanted to create a system role that is based on a users role/responsibilities with an organisation, what methodology is this?
Task 4 Security Models Continued
What is the name of the model that uses the rule "can't read up, can read down"?
What is the name of the model that uses the rule "can read up, can't read down"?
If you were a military, what security model would you use?
If you were a software developer, what security model would the company perhaps use?
Task 5 Threat Modelling & Incident Response
What model outlines "Spoofing"?
What does the acronym "IR" stand for?
You are tasked with adding some measures to an application to improve the integrity of data, what STRIDE principle is this?
An attacker has penetrated your organisation's security and stolen data. It is your task to return the organisation to business as usual. What incident response stage is this?
Last updated
