Introduction to Cybersecurity: First Principles

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Economy of Mechanism

A principle that requires systems to be designed as simple and small as possible

Object-Oriented Programming

A programming language model in which programs are organized around data, or objects, rather than functions and logic.

Domain Separation:

Domain separation allows you to separate data, processes, and administrative tasks into logical groupings called domains. ... Domain separation is the paid plugin that enables this configuration. Also like a tenant in a leased building, each domain can have its own set of data that other domains cannot see.

Simplicity Principle

Easily allows system designers and programmers to identify unwanted access paths.Users can easily translate their general protection goals to appropriate system security configurations.

Encapsulation

Encapsulation is the principle of bundling data and the functions that use them into a single unit called class. All done to prevent the misuse or interference of this data and keep it hidden from the public. For this reason, the data is not accessed directly, but rather through the functions that are present within the class. Thus, this is often done to conceal the internal representation or state of an object from the public. Hence, knowing this, this term leads to the concept of data hiding and abstraction. Inheritance: In object-oriented programming, inheritance enables a new class[es] to acquire the methods and properties of existing classes, which are referred to as subclass or derived classes. Meanwhile, the class that is used for inheritance is known as super class or base class.

Complete Mediation

Every access to every resource must be validated for authorization

Minimization

Having the least functionality necessary in a program or device

Process Isolation

In computer programming, process isolation is the segregation of different computer processes to prevent them from interfering or tampering with memory (address space) they do not own. In this way, it helps programs run smoothly without any trouble.

Least Privilege

In information security, computer science, and other fields, the principle of least privilege (PoLP), also known as the principle of minimal privilege or the principle of least authority, requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program

Class

In object-oriented programming, a Class is a template, or in other words a blueprint, for defining objects. Significantly, that it defines the names, the types of variables that can exist, and the methods that are common to the object being represented.

Inheritance

In object-oriented programming, inheritance enables a new class[es] to acquire the methods and properties of existing classes, which are referred to as subclass or derived classes. Meanwhile, the class that is used for inheritance is known as super class or base class.

Confidentiality

It is an expectation for the entity entrusted with data (or code) to keep it a secret. For example, if a healthcare provider is entrusted with patient data, the user expects the health care provider to keep it secret.

Modularity

Modularity is the process of separating the functionality of a program into separate, independent components, which can be looked at individually. That is, because each component is capable for executing a specific part or function in the functionality of the program being accessed. Thus, this process is often done to debug pieces of a program.

Data Hiding

Only allow necessary aspects of a data structure or a record to be observed or accessed. All access attempts must be logged..

Polymorphism

The concept that multiple types of objects might be able to work in a given situation. Objects of different types can be accessed through the same interface.

Simplicity

The lack of complexity allows system designers and programmers to identify unwanted access paths.

Open Design

The open-design movement involves the development of physical products, machines and systems through use of publicly shared design information. This includes the making of both free and open-source software as well as open-source hardware.

Fail-Safe Defaults

The principle that allows access to resources based on granted access over access exclusion. This principle is a methodology for allowing resources to be accessed only if explicit access is granted to a user

Least common Mechanism

This principle declares that mechanisms used to access resources should not be shared.

Psychological Acceptability

This principle states that user interfaces should be well designed and intuitive, and all security-related settings should adhere to what an ordinary user might expect. Security mechanisms shall not make resources more difficult to access than if the security mechanisms were not present


Set pelajaran terkait

Chapter 2: Atoms, Molecules, and Ions

View Set

Français 3 Unité 2.5 Le monde du travail #2

View Set

Ethos, Pathos, Logos & Persuasive techniques

View Set

Questions to ask during an interview

View Set

AP Classroom Bio Psych Progress Check

View Set