Fundamental security design principles

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

flashcard set

Earn XP

Description and Tags

Last updated 2:01 AM on 4/6/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

14 Terms

1
New cards

Economy of mechanism

Simple designs usually are easier to maintain, extend, and have less exploitable flaws

2
New cards

Fail-safe default

Access decisions should be based on permissions not exclusions

3
New cards

Complete mediation

Access control mechanism should check every access attempt

4
New cards

Open design

security design should be open for public scrutiny and reviews. Encryption keys and the likes should still be secret

5
New cards

Separation of privilege

A practice where multiple privilege attributes are used to gain access to access a restricted resource (2FA, 2 users needed to authenticate something etc)

6
New cards

Least privilege

Every process and user should use role-based access control

7
New cards

Least common mechanism

The design should minimize the functions shared by different users, offering mutual security

8
New cards

Psychological acceptability

security designs should not interfere with a users work, while at the same time still meeting the needs of those with authorized access

9
New cards

Isolation - 3 types

  • Public access systems should be isolated from critical resources

  • The processes and files of individual users should be isolated from each other, unless explicitly desired

  • Security mechanisms should be isolated, meaning prevent access to them

  • e.g. sub-networking, separating servers into web, application, and db servers

10
New cards

Encapsulation

specific form of isolation based on object-oriented functionality (Will learn more in future lecture)

11
New cards

Modularity

security functions created as separate protected modules

12
New cards

Layering

Refers to the use of multiple and overlapping protection approaches being used

13
New cards

Least astonishment

The security measures should make sense to the user and be simple to use

14
New cards

Attack surface

consists of the reachable and exploitable weaknesses in a system or network tat a hacker can attack

Explore top notes

note
APES Unit Review Packet
Updated 329d ago
0.0(0)
note
Cultural Psychology
Updated 170d ago
0.0(0)
note
Unit 4: Rhetorical Fallacies
Updated 1095d ago
0.0(0)
note
Chapter 10 Textbook
Updated 1175d ago
0.0(0)
note
The Columbian Exchange
Updated 1279d ago
0.0(0)
note
AP bio vocab quiz 6
Updated 1288d ago
0.0(0)
note
APES Unit Review Packet
Updated 329d ago
0.0(0)
note
Cultural Psychology
Updated 170d ago
0.0(0)
note
Unit 4: Rhetorical Fallacies
Updated 1095d ago
0.0(0)
note
Chapter 10 Textbook
Updated 1175d ago
0.0(0)
note
The Columbian Exchange
Updated 1279d ago
0.0(0)
note
AP bio vocab quiz 6
Updated 1288d ago
0.0(0)

Explore top flashcards

flashcards
LEC 9.3: Respirations | Vitals
24
Updated 331d ago
0.0(0)
flashcards
French Carnaval de Quebec
67
Updated 1141d ago
0.0(0)
flashcards
Interaction Design
93
Updated 821d ago
0.0(0)
flashcards
Exam 1
190
Updated 1147d ago
0.0(0)
flashcards
ENG Vocab 7-11
67
Updated 1145d ago
0.0(0)
flashcards
LEC 9.3: Respirations | Vitals
24
Updated 331d ago
0.0(0)
flashcards
French Carnaval de Quebec
67
Updated 1141d ago
0.0(0)
flashcards
Interaction Design
93
Updated 821d ago
0.0(0)
flashcards
Exam 1
190
Updated 1147d ago
0.0(0)
flashcards
ENG Vocab 7-11
67
Updated 1145d ago
0.0(0)