πŸ”“Principles of Security

Learn the principles of information security that secures data and protects systems from abuse

https://tryhackme.com/room/principlesofsecurityarrow-up-right
Room Attributes
Value

Subscription Required

False [Free]

Type

Walkthrough

Difficulty

Info

Tags

CIA Triad, Information Security, Incident Response, Threat Model

Task 1 Introduction

Let's proceed!

circle-check

Task 2 The CIA Triad

What element of the CIA triad ensures that data cannot be altered by unauthorised people?

chevron-rightReveal Flag 🚩hashtag

🚩integrity

What element of the CIA triad ensures that data is available?

chevron-rightReveal Flag 🚩hashtag

🚩availability

What element of the CIA triad ensures that data is only accessed by authorised people?

chevron-rightReveal Flag 🚩hashtag

🚩confidentiality

Task 3 Principles of Privileges

What does the acronym "PIM" stand for?

chevron-rightReveal Flag 🚩hashtag

🚩Privileged Identity Management

What does the acronym "PAM" stand for?

chevron-rightReveal Flag 🚩hashtag

🚩Privileged Access Management

If you wanted to manage the privileges a system access role had, what methodology would you use?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩PAM

If you wanted to create a system role that is based on a users role/responsibilities with an organisation, what methodology is this?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩PIM

Task 4 Security Models Continued

What is the name of the model that uses the rule "can't read up, can read down"?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩The Bell-LaPadula Model

What is the name of the model that uses the rule "can read up, can't read down"?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩The Biba Model

If you were a military, what security model would you use?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩The Bell-LaPadula Model

If you were a software developer, what security model would the company perhaps use?

circle-exclamation
chevron-rightReveal Flag 🚩hashtag

🚩The Biba Model

Task 5 Threat Modelling & Incident Response

What model outlines "Spoofing"?

https://web.archive.org/web/20070303103639/http://msdn.microsoft.com/msdnmag/issues/06/11/ThreatModeling/default.aspxarrow-up-right
chevron-rightReveal Flag 🚩hashtag

🚩STRIDE

What does the acronym "IR" stand for?

chevron-rightReveal Flag 🚩hashtag

🚩Incident Response

You are tasked with adding some measures to an application to improve the integrity of data, what STRIDEarrow-up-right principle is this?

chevron-rightReveal Flag 🚩hashtag

🚩Tampering

An attacker has penetrated your organisation's security and stolen data. It is your task to return the organisation to business as usual. What incident response stage is this?

chevron-rightReveal Flag 🚩hashtag

🚩Recovery

Last updated