Security Principles (3) Flashcards

1
Q

Ten Commandments of Security

A
  1. Economy of Mechanisms (EM)
  2. Fail-Safe Defaults
  3. Complete Mediation
  4. Open Design
  5. Separation of Privilege
  6. Least Privilege
  7. Least Common Mechanism
  8. Psychological Acceptability
  9. Work Factor
  10. Compromise Recording
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Economy of Mechanisms (EM)
A

This principle stresses simplicity in the DESIGN and IMPLEMENTATION of security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Fail-Safe Defaults
A

This principle states that the default configuration of a system should have a conservative protection scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Complete Mediation
A

The idea behind this principle is that every access to a resource must be checked for compliance with a protection scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Open Design
A

According to this principle, the security architecture and design of a system should be made publicly available; versus security by obscurity, which tries to achieve security by keeping cryptographic algorithms secret and which has been historically used without success by several organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Separation of Privilege
A

This principle dictates that multiple conditions should be required to achieve access to restricted resources or have a program perform some action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Least Privilege
A

Each program and user of a computer system should operate with the bare minimum privileges necessary to function properly. (need-to-know)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Least Common Mechanism
A

In systems with multiple users, mechanisms allowing resources to be shared by more than one user should be minimized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Psychological Acceptability
A

This principle states that user interfaces should be well designed and intuitive, and all security-related settings should adhere to what an ordinary user might expect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Work Factor
A

According to this principle, the cost of circumventing a security mechanism should be compared with the resources of an attacker when designing a security scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Compromise Recording
A

This principle states that sometimes it is more desirable to record the details of an intrusion than to adopt more sophisticated measures to prevent it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly