Intro to cyber Saltzer Design Principles

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 12

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

13 Terms

1

The main goal of security principles

Provide restrictions with simplicity

New cards
2

Benefits of simplicity

Less complexity provides fewer points of failure and to monitor.
An easier to understand system is easier to defend.

New cards
3

Restriction

Minimize power and access of entities in the system.

Keep the system as close as possible to a safe manageable state.

New cards
4

Least Privilege

Privileges should only be given to a user, application, service, or other entity necessary to complete an intended task.

In the case that a privilege needs to be raised, it will only be so for the duration need to complete the task.

Should be based on function instead of identity.

New cards
5

Fail-Safe defaults

The default state of a resource should be as safe and secure as possible, such as a lack of access or lack of change.

Also makes malfunctions easier to detect.

New cards
6

Economy of Mechanism

Designs should be kept as simple as possible.

As with the intentions of security principles, this allows less complexity meaning fewer point of error.

examples of smaller designs -

Line-by line inspection of software to locate vulnerabilities or bugs.

Physical inspection of hardware to locate damage or troubleshoot a problem.

New cards
7

Separation of privileges

Permission should not be granted based on a single condition. “Requiring multiple conditions to gain permission is more secure.”

Prevents any single accident, deception, or breach of trust from enabling a harmful action.

Responsibilities should be separated to prevent deception and single points of failure.

New cards
8

Complete mediation

Each access to an objected must be validated each time it occurs.

New cards
9

Open design

System should not depend on the secrecy of design, implementation, or configuration. “Security should not depend on obscurity.”

Aids in mitigating damage caused by reverse engineering, leaks, inference, OSINT gathering, or regular examination.

New cards
10

Least common mechanism

Minimization of the amount of mechanisms common to more than one user and/or depended on by all users. Essentially, avoid sharing resources.

Shared channels make it more difficult to control the flow of information. When multiple users are reading or writing to the same area, data can be leaked or modified.

New cards
11

Psychological acceptability

Security mechanisms in place should not unreasonably affect legitimate users.

The interface should be designed for ease of use. Complexity introduced by security mechanisms should occur behind the scenes and have a minimal impact on the user.

The system should behave as the user expects and its mechanisms should be easy to understand.

New cards
12

Work Factor

The investment an attacker must make to circumvent a security mechanism.

New cards
13

Compromise Recording

The mechanism by which a compromise can be reliably recorded.

New cards

Explore top notes

note Note
studied byStudied by 21 people
991 days ago
5.0(1)
note Note
studied byStudied by 8 people
771 days ago
5.0(1)
note Note
studied byStudied by 19 people
896 days ago
5.0(2)
note Note
studied byStudied by 71 people
308 days ago
5.0(1)
note Note
studied byStudied by 82 people
902 days ago
5.0(1)
note Note
studied byStudied by 22 people
844 days ago
5.0(2)
note Note
studied byStudied by 3 people
24 days ago
5.0(1)
note Note
studied byStudied by 6307 people
705 days ago
4.9(48)

Explore top flashcards

flashcards Flashcard (21)
studied byStudied by 63 people
30 days ago
5.0(2)
flashcards Flashcard (31)
studied byStudied by 2 people
548 days ago
5.0(1)
flashcards Flashcard (147)
studied byStudied by 2 people
17 days ago
5.0(1)
flashcards Flashcard (33)
studied byStudied by 51 people
63 days ago
5.0(1)
flashcards Flashcard (37)
studied byStudied by 27 people
700 days ago
4.0(1)
flashcards Flashcard (41)
studied byStudied by 3 people
190 days ago
5.0(1)
flashcards Flashcard (37)
studied byStudied by 1 person
126 days ago
5.0(1)
flashcards Flashcard (129)
studied byStudied by 3 people
105 days ago
5.0(1)
robot