Session 02 : Principles of Secure Design Flashcards
Principles of Secure design?
- Least privilege and isolation
- End-to-end security
- Fail-safe defaults
- Open design
- Defense in depth
- Security by design
- Tension between security and other design goals
- complete mediation
- Use of vetted security components
- Economy of mechanism
- Least Privilege and Isolation : what is ?
- Users, programs, and systems should have the minimum access which needed to do their job.
- Different system components should be isolated from each other so that if one part is compromised, the rest remains safe.
- Least Privilege and Isolation : examples ?
- A cashier in a supermarket can access the billing system but not customer financial record.
- In Windows and Linux, regukar users cannot install software or change system settings without admin rights.
- Least Privilege and Isolation : why it’s important ?
- Reduce the damage an attacker can do if they gain access.
- Prevents accidental mistakes from affecting the entire system.
2) End-to-end security : what is?
- Data should be protected at all stages-when stored, transmitted, and processed.
2) End-to-end security : examples?
- WhatsApp use end-to-end encryption, only the sender and receiver can read messages, even if intercepted.
- Online banking encrypts data from the user’s browser to the bank’s server.
2) End-to-end security : why it’s important?
Protects sensitive data from hackers who try to steal or modify it.
3) Fail-Safe Defaults : what is?
- The system should deny access by default and grant access only when explicitly allowed.
3) Fail-Safe Defaults : examples?
- If a user enters the wrong password multiple times, the account gets locked instead of allowing further attempts.
- Firewall rules should block all network traffic by default and allow only approved connections
- A new employee should not have access to confidential files unless specifically given permission.
3) Fail-Safe Defaults : why it’s important?
Prevents unauthorized access if security settings are misconfigured.
4) Open Design : what is ?
Security should not depend on secrecy of design but on strong security mechanisms that can withstand public scrutiny.
4) Open Design : examples ?
- Encryption algorithms (AES, RSA, SHA-256) are publicly know but remain secure because they rely on mathematical streangth.
- Linux operating system is open-source, meaning anyone can review its security code.
4) Open Design : why it’s important ?
- Security through secrecy is weak because once exposed, the system become vulnerable.
- Publicly tested security mechanisms are more trustworthy.
5) Defence in Depth?
-
What? :
- Use **multiple layers of security ** so that if one layer fails, others still provide protection.
-
Examples? :
- Cybersecurity uses firewalls, antivirus, encryption, multi-factor authentication (MFA) to protect data.
-
Why it’s important:
- Multipe layers reduce overall risk.
6) Security by Design?
-
What ?
- Security should be built into the system from the start, not added later as an afterthought.
-
Examples ?
- Employ the security practices into SDLC
-
Why important ?
- Fixing security flaws later is expensive and risky.
7) Tensions Between Security and Other Design Goals
-
What ?
- Security must be balanced with usability, performance, and cost.
-
Examples ?
- Strong passwords increase security but make them hard to remember
- MFA improves security but takes extra time.
- Encrypted DBs are secure but need more processing power.
-
Why important ?
- Too much security can make a system inconvenient and reduce productivity.
- Finding the right balance ensures both security and efficiency.
8) Compile Mediation
-
What ?
- Every access request should be checked every time, not just once.
-
Examples ?
- ATM transaction require a PIN for each withdrawl
- Online banking logs you out after inactivity to prevent unauthorized access.
- OSs rechek user permissions every time a file is accessed.
-
Why important ?
- Prevent Session hijacking and unauthorized access.
9) Use of vetted security components
-
What ?
- Use of tursted and well-tested security tools instead of creating custom.
-
Examples ?
- Use AES encryption, instead of inventing new encryption method.
- Use verified security libraries, instead of writing custom.
-
Why important ?
- New untested security solutions often have hidden vulnerabilities.
10) Economy of mechanism
-
What ?
- Keep security systems as simple as possible to reduce errors and vulnerabilites.
-
Examples ?
- Use simple password system with strong encryption.
- Unix file permissions are simpler than complex access control models but still effective.
- Firewalls with clear rules are easier to maintain.
-
Why important ?
- Complex systems are harder to test and often contain hidden vulnerabilities.
11) Usable security
-
What ?
- Security systems should be easy to use, so that people can follow security best practices without confusion or frustation.
-
Examples ?
- Password managers make it easier to use strong, unique passwords for each account.
- Fingerprint scanners on phones provide strong security without needing complex passwords.
- 2FA apps make logins more secure and user-friendly
-
Why important ?
- If secrity is too difficult, users will find workarounds.
12) Security composability
-
What ?
- Different security components should work together seamlessly to provide strong protection.
-
Examples ?
- Online banking uses encryption, user authentication, firewalls, and fraud detection - each layer supports the others.
- Web securtiy combines HTTPS, firewalls, input validation, and intrusion detection.
-
Why important ?
- If security systems don’t work together properly, gaps may create weak points that hackers can exploit.
13) Prevention, Detection, and Deterrence
-
What ?
- A compleate security system should include 3 key steps.
- Prevention : Stop attacks before happens
- Detection : Identify attacks when they occur.
- Deterrence : Make attacks less attractive or too risky for attackers
- A compleate security system should include 3 key steps.
-
Examples ?
- Cybersecurity
- Prevention : Firewalls and antivirus softwares block malware.
- Detection : IDS monitor for unusual behaviour.
- Deterrence : Strong encryption and legal consequences make hacking difficult and risky.
- Physical Security
- Prevention : Locked doors and Security guards
- Detection : Security cameras and alarms
- Deterrence : Warning signs
- Cybersecurity
-
Why important ?
- No single security measure is enough - a complete system needs all three to be effective.