Security Principles Flashcards

1
Q

Describe this security principle:

Know Your Threat Model

A

Know what you’re protecting and from whom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the Know Your Threat Model include?

A
  • Assumptions
  • Most critical relevant threats
  • Specified actions and steps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When should the Know Your Threat Model be performed?

A

Before and after deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe this security principle:

Economy of Security Mechansim

A

Make it so that the reward is not worth the effort for the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the trade off for the defender with the Economy of Security Mechanism?

A

Cost and level of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe this security principle:

Open Design

A

Protect the key > secret design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What two principles go in hand with Open Design?

A

Kerckhoff’s Principle and Shannon’s Maxim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe

Kerckhoff’s Principle

A

The system should still be secure even if everything about it is public except for the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe

Shannon’s Maxim

A

The enemy will know the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe this security principle:

Fail-Safe Defaults

A

Have access based on explicit permission instead of exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are conditional requirements not included in Fail-Safe Defaults?

A

Risky, limited scope, could produce false negative/positive results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe this security principle:

Least Privilege

A

Granting minimal access using compartmentalization and isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define

Compartmentalization

A

Division into separate components so that each has their own data and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define

Isolation

A

Separation for independent functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why are compartmentalization and isolation necessary in security defenses?

A

Contains the threats to 1 spot and minimized lateral movement between functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe this security principle: Architecture Design

Name the two architectural designs

A

Monolithic and Component

17
Q

Define

Monolithic Architecture Design

A

The system/entity is 1 tight unit with the same processes and runtime

18
Q

Define

Component Architecture Design

A

Multiple separate entities

19
Q

Pros of Monolithic Design

A

Simplier and easier to develop, increased performance (more efficient)

20
Q

Cons of Monolithic Design

A

Not scalable, inflexible, difficult to maintain if the system is too large

21
Q

Pros of Component Design

A

Modularity, easy maintanence, flexible, scalable

22
Q

Cons of Component Design

A

Complex with significant overhead involved

23
Q

When is it best to use either Monolithic or Component architecture designs?

A

Monolithic: smaller projects
Component: larger projects

24
Q

Describe this security principle:

Complete Mediation

A

Every access to every resource is checked which is reinforced by the reference monitor

25
Q

Criteria of a reference monitor

A
  • Unbypassable
  • Temper-proof
  • Verifiable
26
Q

Describe this security principle:

Separation of Privilege

A

Dsitribution of function across multiple entities

27
Q

Describe this security principle:

Defense in Depth

A

Multiple security measures that uses 2 of:
* Something the user knows
* Something the user has
* Something the user is

28
Q

Provide an example for each of the criterias of the Defense in Depth:
* Something the user knows
* Something the user has
* Something the user is

A

Something the user knows: a password, code
Something the user has: phone
Something the user is: face/fingerprint

29
Q

When dealing with human factors, what is one solution to complex password requirements?

A

A password manager that will store complex passwords but the user only has to remember one password to access the manager

30
Q

Define

Psychological acceptability

A

Is it reasonable, understandable, and acceptable?

31
Q

What should you be resilient to when thinking about security principles?

A

Variations in human behavior

32
Q

What should you not overly rely on when thinking about security principles?

A

Don’t overly rely on assumptions

33
Q

What should you address when thinking about security?

A

The weakest link

34
Q

List all of the Security Principles

A
  • Know Your Threat Model
  • Economy of Security Mechanism
  • Open Design
  • Fail-Safe Defaults
  • Least Privilege
  • Separation of Privilege
  • Defense in Depth
  • Complete Mediation