Principles of Security: TryHackMe

Hiteshverma
4 min readFeb 25, 2024

--

Task 1 Introduction

No answer needed

Task 2 The CIA Triad

CIA Triad:

  • Confidentiality:
  • Protects data from unauthorized access and misuse.
  • Examples include employee records and accounting documents.
  • Access controls and sensitivity classification rating systems are used.
  • Integrity:
  • Ensures information is accurate and consistent, authorized changes only.
  • Defenses include access control, rigorous authentication, hash verifications, and digital signatures.
  • Availability:
  • Information must be available and accessible to authorized users.
  • Key benchmark for organizations, often measured in uptime percentages (e.g., 99.99%).
  • Achieved through reliable hardware, redundant technology, and robust security protocols.

Additional Points:

  • CIA Triad is a continuous cycle, and all three elements must be addressed for effective security.
  • If one element is not met, the others become less effective (similar to the fire triangle).
  • The model applies beyond cybersecurity, encompassing scenarios like filing and record storage.
  • Originating in 1998, the CIA Triad is an industry-standard security model.
  • Security policies should address Confidentiality, Integrity, and Availability to be effective.

What element of the CIA triad ensures that data cannot be altered by unauthorised people?

Ans: integrity

What element of the CIA triad ensures that data is available?

Ans: availability

What element of the CIA triad ensures that data is only accessed by authorised people?

Ans: confidentiality

Task 3 Principles of Privileges

  • Levels of Access Determination:
  • Based on the individual’s role/function within the organization.
  • Influenced by the sensitivity of the information stored on the system.
  • Key Concepts for Access Management:
  • Privileged Identity Management (PIM):
  • Translates a user’s role within an organization into an access role on a system.
  • Privileged Access Management (PAM):
  • Manages the privileges of a system’s access role.
  • Encompasses security policies like password management, auditing, and reducing the attack surface.
  • Principle of Least Privilege:
  • Users should have the minimum privileges necessary for their duties.
  • Enhances trust in user actions and reduces potential risks.
  • PAM’s Comprehensive Scope:
  • Beyond access assignment, includes enforcing security policies.
  • Involves aspects like password management, auditing, and minimizing the system’s attack surface.

What does the acronym “PIM” stand for?

Ans: Privileged Identity Management

What does the acronym “PAM” stand for?

Ans: Privileged Access Management

If you wanted to manage the privileges a system access role had, what methodology would you use?

Ans: PAM

If you wanted to create a system role that is based on a users role/responsibilities with an organisation, what methodology is this?

Ans: PIM

Task 4 Security Models Continued

What is the name of the model that uses the rule “can’t read up, can read down”?

Ans: The Bell-LaPadula Model

What is the name of the model that uses the rule “can read up, can’t read down”?

Ans: The Biba Model

If you were a military, what security model would you use?

Ans: The Bell-LaPadula Model

If you were a software developer, what security model would the company perhaps use?

Ans: The Biba Model

Task 5 Threat Modelling & Incident Response

What model outlines “Spoofing”?

Correct Answer

What does the acronym “IR” stand for?

Correct Answer

You are tasked with adding some measures to an application to improve the integrity of data, what STRIDE principle is this?

Correct Answer

An attacker has penetrated your organisation’s security and stolen data. It is your task to return the organisation to business as usual. What incident response stage is this?

**Threat Modelling:**

- **Definition:**
— Process of reviewing, improving, and testing security protocols in an organization’s IT infrastructure.
— Involves identifying likely threats and vulnerabilities in applications or systems.

- **Process Principles:**
— **Preparation:**
— Ready the organization for threat modelling.
— **Identification:**
— Identify likely threats and vulnerabilities.
— **Mitigations:**
— Develop strategies to mitigate identified threats.
— **Review:**
— Constantly review and discuss the threat model with a dedicated team.

- **Effective Threat Model Includes:**
— Threat intelligence
— Asset identification
— Mitigation capabilities
— Risk assessment

- **Frameworks:**
— **STRIDE:**
— Spoofing
— Tampering
— Repudiation
— Information Disclosure
— Denial of Service
— Elevation of Privileges

- **PASTA:**
— Process for Attack Simulation and Threat Analysis

**Incident Response (IR):**

- **Definition:**
— Actions taken to resolve and remediate security incidents.

- **Classification:**
— Incidents are classified by urgency and impact.

- **CSIRT:**
— Computer Security Incident Response Team
— A prearranged group with technical knowledge to respond to incidents.

  • **Six Phases of Incident Response:**
    — **Preparation:**
    — Ensure resources and plans are in place.
    — **Identification:**
    — Correctly identify the threat and actor.
    — **Containment:**
    — Contain the threat to prevent further impact.
    — **Eradication:**
    — Remove the active threat.
    — **Recovery:**
    — Review impacted systems to return to normal operations.
    — **Lessons Learned:**
    — Learn from the incident; improve training and measures.

What model outlines “Spoofing”?

Ans: STRIDE

What does the acronym “IR” stand for?

Ans: Incident Response

You are tasked with adding some measures to an application to improve the integrity of data, what STRIDE principle is this?

Ans: Tampering

An attacker has penetrated your organisation’s security and stolen data. It is your task to return the organisation to business as usual. What incident response stage is this?

Ans: Recovery

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Hiteshverma
Hiteshverma

No responses yet

Write a response