ITEC 100- WEEK 3

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

are taken into account when creating any security mechanism for a system.

These principles are evaluated to build a secure system that mitigates

security vulnerabilities and restricts unauthorized access.

Security design principles

2
New cards

Keeps Security designs simple and small to reduce complexity and minimize vulnerabilities.

Economy of Mechanism

3
New cards

Deny access by default and grant permissions only when explicitly allowed.

Fail-safe Defaults

4
New cards

Every access request must be checked for authorization, preventing bypassing of security controls.

Complete Mediation

5
New cards

Security should not rely on secrecy; systems should remain secure even if their design is publicly known.

Open Design

6
New cards

Access control should require multiple independent conditions to enhance security (e.g., multi- factor authentication).

Separation of Privilege

7
New cards

Users and processes should operate with the minimum privileges necessary to perform their tasks.

Least Privilege

8
New cards

Reduce shared components between users to minimize potential attack vectors.

Least Common Mechanism

9
New cards

Security measures should be user-friendly to ensure compliance without frustration.

Psychological Acceptability

10
New cards

Keep critical system components separate to limit the impact of security breaches.

Isolation

11
New cards

Restrict direct access to data and ensure that interactions occur through controlled interfaces.

Encapsulation

12
New cards

Design systems in independent, interchangeable components to enhance security and maintainability.

Modularity

13
New cards

Implement multiple layers of defense to provide redundancy in case one layer fails.

Layering

14
New cards

System behavior should be predictable and intuitive to avoid user errors that compromise security.

Least Astonishment

15
New cards

A well-designed security system is essential for protecting data, resources, and users by minimizing vulnerabilities, mitigating risks, and enforcing access controls. The effectiveness of security systems, such as cameras and alarms, depends on factors like equipment, network infrastructure, and coverage, but strong design is key to optimal performance//

16
New cards

Security by design acknowledges that developers make mistakes, so the goal is to minimize errors and detect them early. This can be achieved through nine key steps

Designing Security

17
New cards

Leverage secure, well-maintained tools and libraries.

Use Proven Technology

18
New cards

Educate developers on threats and security principles.

Create Awareness

19
New cards

Provide security guidelines in context rather than relying solely on developer knowledge.

Limit Instruction Dependence

20
New cards

Keep code clean and manageable to reduce security risks.

Ensure Maintainability

21
New cards

Use tools to detect vulnerabilities efficiently.

Automate Security Checks

22
New cards

Supplement automated tools with expert security assessments

Conduct Manual Reviews

23
New cards

Incorporate data protection measures.

Integrate Privacy by Design

24
New cards

Develop a structured plan for ongoing security enhancements.

Continuously Improve

25
New cards

Apply security principles retroactively to legacy code.

Secure Existing Systems