đŸš©
THM Walkthroughs
  • THM Walkthroughs
    • đŸ§‘â€đŸ«Tutorial
  • 🟩Difficulty: Info
    • 🔌What is Networking?
    • 🔌Intro to LAN
    • 🐧Linux Fundamentals
      • 🐧Linux Fundamentals Part 1
        • Task 2 - A Bit of Background on Linux
        • Task 4 - Running Your First few Commands
        • Task 5 - Interacting With the Filesystem!
        • Task 6 - Searching for Files
        • Task 7 - An Introduction to Shell Operators
      • 🐧Linux Fundamentals Part 2
        • Task 3 - Introduction to Flags and Switches
        • Task 4 - Filesystem Interaction Continued
        • Task 5 - Permissions 101
        • Task 6 - Common Directories
      • 🐧Linux Fundamentals Part 3
        • Task 3 - Terminal Text Editors
        • Task 4 - General/Useful Utilities
        • Task 5 - Processes 101
        • Task 6 - Maintaining Your System: Automation
        • Task 8 - Maintaining Your System: Logs
    • đŸȘŸWindows Fundamentals
      • đŸȘŸWindows Fundamentals 1
      • đŸȘŸWindows Fundamentals 2
      • đŸȘŸWindows Fundamentals 3
    • 🔓Principles of Security
    • 🐍Python Basics
    • 🔍History of Malware
    • đŸŠčCommon Attacks
    • đŸ–„ïžSecurity Awareness
    • ⚔Intro to Offensive Security
    • đŸŠčPentesting Fundamentals
    • 🔓CVE Walkthroughs
      • đŸ–„ïžSudo Security Bypass: CVE-2019-14287
      • đŸ–„ïžSudo Buffer Overflow: CVE-2019-18634
      • đŸ–„ïžBaron Samedit: CVE-2021-3156
      • đŸ–„ïžOverlayFS: CVE-2021-3493
      • đŸ–„ïžPolkit: CVE-2021-3560
      • đŸ–„ïžPwnkit: CVE-2021-4034
      • đŸȘ¶Apache HTTP Server Path Traversal: CVE-2021-41773/42013
      • đŸ§»Dirty Pipe: CVE-2022-0847
      • 🟱Spring4Shell: CVE-2022-22965
    • 🟧Burp Suite
      • 🟧Burp Suite: The Basics
      • 🟧Burp Suite: Repeater
    • 🏁Challenges
      • ‎Bypass Disable Functions
    • đŸŽŸïžTHM PROMOs
      • đŸŽŸïžLearn and win prizes [PROMO ENDED]
      • đŸŽŸïžLearn and win prizes #2 [PROMO ENDED]
  • đŸŸ©Difficulty: Easy
    • 🚀Learning Cyber Security
    • 🔁The Hacker Methodology
    • 🔍Google Dorking
      • Task 2 - Let's Learn About Crawlers
      • Task 4 - Beepboop - Robots.txt
      • Task 5 - Sitemaps
      • Task 6 - What is Google Dorking?
    • 🐝OWASP Top 10
      • Task 5 - Command Injection Practical
      • Task 7 - Broken Authentication Practical
      • Task 11 - Sensitive Data Exposure (Challenge)
      • Task 13 - XML External Entity - eXtensible Markup Language
      • Task 14 - XML External Entity - DTD
      • Task 16 - XML External Entity - Exploiting
      • Task 18 - Broken Access Control (IDOR Challenge)
      • Task 19 - Security Misconfiguration
      • Task 20 - Cross-site Scripting
      • Task 21 - Insecure Deserialization
      • Task 24 - Insecure Deserialization - Cookies
      • Task 25 - Insecure Deserialization - Cookies Practical
      • Task 30 - Insufficient Logging and Monitoring
    • 📡Nmap
      • Task 2 - Introduction
      • Task 3 - Nmap Switches
      • Task 5 - TCP Connect Scans
      • Task 6 - Scan Types SYN Scans
      • Task 7 - UDP Scans
      • Task 8 - NULL, FIN and Xmas
      • Task 9 - ICMP Network Scanning
      • Task 10 - NSE Scripts Overview
      • Task 11 - Working with the NSE
      • Task 12 - Searching for Scripts
      • Task 13 - Firewall Evasion
      • Task 14 - Practical
    • 📡RustScan
      • Task 2 - Installing RustScan
      • Task 5 - Extensible
      • Task 7 - Scanning Time!
      • Task 8 - RustScan Quiz
    • 🐙Crack the hash
    • 🌍OhSINT
    • 🧑‍🚀Vulnversity
    • 🧊Ice
    • đŸȘŸBlue
    • 🎄Advent of Cyber 4 (2022)
  • 🟹Difficulty: Medium
    • đŸȘŸAttacktive Directory
      • Task 3 - Welcome to Attacktive Directory
      • Task 4 - Enumerating Users via Kerberos
      • Task 5 - Abusing Kerberos
      • Task 6 - Back to the Basics
      • Task 7 - Elevating Privileges within the Domain
      • Task 8 - Flag Submission Panel
    • 💀Mr Robot CTF
    • 🛗Linux PrivEsc
    • 🛗Linux PrivEsc Arena [WIP]
    • 🛗Windows PrivEsc Arena
  • 🟧Difficulty: Hard
    • 🐘Hacking Hadoop [WIP]
  • đŸŸ„Difficulty: Insane
    • â›șYou're in a cave [WIP]
  • Blank Room (Duplicate Me)
Powered by GitBook
On this page
  • Task 1 Introduction
  • Let's proceed!
  • Task 2 The CIA Triad
  • What element of the CIA triad ensures that data cannot be altered by unauthorised people?
  • What element of the CIA triad ensures that data is available?
  • What element of the CIA triad ensures that data is only accessed by authorised people?
  • Task 3 Principles of Privileges
  • What does the acronym "PIM" stand for?
  • What does the acronym "PAM" stand for?
  • If you wanted to manage the privileges a system access role had, what methodology would you use?
  • If you wanted to create a system role that is based on a users role/responsibilities with an organisation, what methodology is this?
  • Task 4 Security Models Continued
  • What is the name of the model that uses the rule "can't read up, can read down"?
  • What is the name of the model that uses the rule "can read up, can't read down"?
  • If you were a military, what security model would you use?
  • If you were a software developer, what security model would the company perhaps use?
  • Task 5 Threat Modelling & Incident Response
  • What model outlines "Spoofing"?
  • What does the acronym "IR" stand for?
  • You are tasked with adding some measures to an application to improve the integrity of data, what STRIDE principle is this?
  • An attacker has penetrated your organisation's security and stolen data. It is your task to return the organisation to business as usual. What incident response stage is this?
  1. Difficulty: Info

Principles of Security

Learn the principles of information security that secures data and protects systems from abuse

PreviousWindows Fundamentals 3NextPython Basics

Last updated 2 years ago

Room Attributes
Value

Subscription Required

False [Free]

Type

Walkthrough

Difficulty

Info

Tags

CIA Triad, Information Security, Incident Response, Threat Model

Task 1 Introduction

Let's proceed!

No answer needed

Task 2 The CIA Triad

What element of the CIA triad ensures that data cannot be altered by unauthorised people?

What element of the CIA triad ensures that data is available?

What element of the CIA triad ensures that data is only accessed by authorised people?

Task 3 Principles of Privileges

What does the acronym "PIM" stand for?

What does the acronym "PAM" stand for?

If you wanted to manage the privileges a system access role had, what methodology would you use?

HINT: I'm looking for the short acronym here (PIM/PAM)

If you wanted to create a system role that is based on a users role/responsibilities with an organisation, what methodology is this?

HINT: I'm looking for the short acronym here (PIM/PAM)

Task 4 Security Models Continued

What is the name of the model that uses the rule "can't read up, can read down"?

HINT: Formatting: The x Model Look at the direction of the arrows and the text next to them to understand what directions can read up/down depending upon the model

What is the name of the model that uses the rule "can read up, can't read down"?

HINT: Formatting: The x Model Look at the direction of the arrows and the text next to them to understand what directions can read up/down depending upon the model

If you were a military, what security model would you use?

HINT: Formatting: The x Model

If you were a software developer, what security model would the company perhaps use?

HINT: Formatting: The x Model

Task 5 Threat Modelling & Incident Response

What model outlines "Spoofing"?

What does the acronym "IR" stand for?

An attacker has penetrated your organisation's security and stolen data. It is your task to return the organisation to business as usual. What incident response stage is this?

Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag

You are tasked with adding some measures to an application to improve the integrity of data, what principle is this?

Reveal Flag
Reveal Flag

integrity

availability

confidentiality

Privileged Identity Management

Privileged Access Management

PAM

PIM

The Bell-LaPadula Model

The Biba Model

The Bell-LaPadula Model

The Biba Model

STRIDE

Incident Response

Tampering

Recovery

🟩
🔓
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
STRIDE
LogoTryHackMe | Principles of SecurityTryHackMe
https://tryhackme.com/room/principlesofsecurity
Threat Modeling: Uncover Security Design Flaws Using The STRIDE Approach -- MSDN Magazine, November 2006
https://web.archive.org/web/20070303103639/http://msdn.microsoft.com/msdnmag/issues/06/11/ThreatModeling/default.aspx