Security Principles

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:38 AM on 10/23/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

10 Terms

1
New cards

Economy of Mechanism

security systems should be as simple as possible

2
New cards

Open Design

Assume the enemy knows the system, allow algorithms to be open to public scrutiny, and keep cryptographic keys private

3
New cards

Ensure Complete Mediation

All access should be monitored, protected, and go through one point (reference monitor)

4
New cards

Least Privilege

Every process + system user should operate w/ least privilege possible in order to perform a task

5
New cards

Work Factor

Cost of bypassing a security mechanism should be compared w/ the resources of an attacker when designing a security scheme

6
New cards

Use Fail-Safe defaults

When protection fails, go into a safe mode

7
New cards

Separation of privileges

Split up privilege so no one person/system has complete power - require multiple parties to approve before access is granted

8
New cards

Defense in depth

If you use multiple redundant protections, then all of them would need to be breacahed before the systemโ€™s security will be endangered

9
New cards

Detect if you Canโ€™t Prevent

  1. Deter: stop the attack before it happens by making the attacker prefer to do something else

  2. Prevent: stop the attack before it happens by making the attack fail

  3. Detect: if you canโ€™t stop the attack from happening, you should at least be able to know that the attack has happenedย 

    1. Save audit logs so that you can detect + analyze break-ins

  4. Next step - recover system + respond to attack

10
New cards

Design security in from the start

Trying to add security to an existing application after it has been designed + implemented is v difficult

Explore top flashcards