Principles of Security
-
Let's proceed !
No Answer
-
What element of the CIA triad ensures that data cannot be altered by unauthorised people ?
Answer : Integrity
-
What element of the CIA triad ensures that data is available ?
Answer : Availability
-
What element of the CIA triad ensures that data is only accessed by authorised people ?
Answer : Confidentiality
-
What does the acronym "PIM" stand for ?
Answer : Privileged Identity Management
-
What does the acronym "PAM" stand for ?
Answer : Privileged Access Management
-
If you wanted to manage the privileges a system access role had, what methodology would you use ?
Answer : PAM
-
If you wanted to create a system role that is based on a users role/responsibilities with an organisation, what methodology is this?
Answer : PIM
-
What is the name of the model that uses the rule "can't read up, can read down" ?
Answer : The Bell-la Padula Model
-
What is the name of the model that uses the rule "can read up, can't read down" ?
Answer : The Biba Model
-
If you were a military, what security model would you use ?
Answer : The Bell-la Padula Model
-
If you were a software developer, what security model would the company perhaps use ?
Answer : The Biba Model
-
What model outlines "Spoofing" ?
Answer : STRIDE
-
What does the acronym "IR" stand for ?
Answer : Incident Response
-
You are tasked with adding some measures to an application to improve the integrity of data, what STRIDE principle is this ?
Answer : Tampering
-
An attacker has penetrated your organisation's security and stolen data. It is your task to return the organisation to business as usual. What incident response stage is this ?
Answer : Recovery