Ciphers Security

TryHackMe Walkthrough: Principles of Security

principles of security

The following room is going to outline some of the fundamental principles of security. The frameworks used to protect data and systems to the elements of what exactly makes data secure.

Room Link Principles of Security

The measures, frameworks and protocols discussed throughout this room all play a small part in “Defence in Depth.”

Defence in Depth is the use of multiple varied layers of security to an organisation’s systems and data in the hopes that multiple layers will provide redundancy in an organisation’s security perimeter.

Task 2 The CIA Triad Principles of Security

principles of security

Question: What element of the CIA triad ensures that data cannot be altered by unauthorised people?
Answer: Integrity

Question: What element of the CIA triad ensures that data is available?
Answer: Availability

Question: What element of the CIA triad ensures that data is only accessed by authorised people?
Answer: Confidentiality

Task 3 Principles of Privileges Principles of Security

Question: What does the acronym “PIM” stand for?
Answer: Privileged Identity Management

Question: What does the acronym “PAM” stand for?
Answer: Privileged Access Management

Question: If you wanted to manage the privileges a system access role had, what methodology would you use?
Hint: I’m looking for the short acronym here (PIM/PAM)
Answer: PAM

Question: If you wanted to create a system role that is based on a users role/responsibilities with an organisation, what methodology is this?
Hint: I’m looking for the short acronym here (PIM/PAM)
Answer: PIM

Task 4 Security Models Continued Principles of Security

The Bell-La Padula Model
Biba Model

Question: What is the name of the model that uses the rule “can’t read up, can read down”?
Hint: Formatting: The x Model Look at the direction of the arrows and the text next to them to understand what directions can read up/down depending upon the model. Note: In some textbooks, it is described as “no read up” and “no write down.”
Answer: The Bell-La Padula Model

Question: What is the name of the model that uses the rule “can read up, can’t read down”?
Hint: Formatting: The x Model Look at the direction of the arrows and the text next to them to understand what directions can read up/down depending upon the model. Note: In some textbooks, it is described as “no read down” and “no write up.”
Answer: the Biba Model

Question: If you were the military, what security model would you use?
Hint: Formatting: The x Model
Answer: The Bell LaPadula Model

Question: If you were a software developer, what security model would the company perhaps use?
Hint: Formatting: The x Model
Answer: the Biba Model

Task 5 Threat Modelling & Incident Response Principles of Security

Question: What model outlines “Spoofing”?
Answer: Stride

Question: What does the acronym “IR” stand for?
Answer: Incident Response

Question: You are tasked with adding some measures to an application to improve the integrity of data, what STRIDE principle is this?
Answer: Tampering

Question: An attacker has penetrated your organisation’s security and stolen data. It is your task to return the organisation to business as usual. What incident response stage is this? 
Answer: Recovery

Principles of Security

If you have any queries regarding the above content, or you want to update anything in the content, then contact us with your queries. You can directly post your question in the group.

Connect with us on these platforms




RECENT POST

Connect with us