Principles of Security is another info-based level, where it gives you information and you should read it and understand it before proceeding to the next level.
you can access the level on TryHackMe from here.
Since it’s information based level, only answers will be provided.
What element of the CIA triad ensures that data cannot be altered by unauthorised people?
integrity
What element of the CIA triad ensures that data is available?
availability
What element of the CIA triad ensures that data is only accessed by authorised people?
confidentiality
What does the acronym “PIM” stand for?
Privileged Identity Management
What does the acronym “PAM” stand for?
Privileged Access Management
If you wanted to manage the privileges a system access role had, what methodology would you use?
PAM
If you wanted to create a system role that is based on a users role/responsibilities with an organisation, what methodology is this?
PIM
What is the name of the model that uses the rule “can’t read up, can read down”?
The Bell-LaPadula Model
What is the name of the model that uses the rule “can read up, can’t read down”?
The Biba Model
If you were a military, what security model would you use?
The Bell-LaPadula Model
If you were a software developer, what security model would the company perhaps use?
The Biba Model
What model outlines “Spoofing”?
STRIDE
What does the acronym “IR” stand for?
Incident Response
You are tasked with adding some measures to an application to improve the integrity of data, what STRIDE principle is this?
Tampering
An attacker has penetrated your organisation’s security and stolen data. It is your task to return the organisation to business as usual. What incident response stage is this?
Recovery
And that’s all for Principles of Security.
Recent Comments