Security Principles Flashcards

(34 cards)

1
Q

Describe this security principle:

Know Your Threat Model

A

Know what you’re protecting and from whom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the Know Your Threat Model include?

A
  • Assumptions
  • Most critical relevant threats
  • Specified actions and steps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When should the Know Your Threat Model be performed?

A

Before and after deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe this security principle:

Economy of Security Mechansim

A

Make it so that the reward is not worth the effort for the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the trade off for the defender with the Economy of Security Mechanism?

A

Cost and level of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe this security principle:

Open Design

A

Protect the key > secret design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What two principles go in hand with Open Design?

A

Kerckhoff’s Principle and Shannon’s Maxim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe

Kerckhoff’s Principle

A

The system should still be secure even if everything about it is public except for the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe

Shannon’s Maxim

A

The enemy will know the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe this security principle:

Fail-Safe Defaults

A

Have access based on explicit permission instead of exclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are conditional requirements not included in Fail-Safe Defaults?

A

Risky, limited scope, could produce false negative/positive results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe this security principle:

Least Privilege

A

Granting minimal access using compartmentalization and isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define

Compartmentalization

A

Division into separate components so that each has their own data and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define

Isolation

A

Separation for independent functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why are compartmentalization and isolation necessary in security defenses?

A

Contains the threats to 1 spot and minimized lateral movement between functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe this security principle: Architecture Design

Name the two architectural designs

A

Monolithic and Component

17
Q

Define

Monolithic Architecture Design

A

The system/entity is 1 tight unit with the same processes and runtime

18
Q

Define

Component Architecture Design

A

Multiple separate entities

19
Q

Pros of Monolithic Design

A

Simplier and easier to develop, increased performance (more efficient)

20
Q

Cons of Monolithic Design

A

Not scalable, inflexible, difficult to maintain if the system is too large

21
Q

Pros of Component Design

A

Modularity, easy maintanence, flexible, scalable

22
Q

Cons of Component Design

A

Complex with significant overhead involved

23
Q

When is it best to use either Monolithic or Component architecture designs?

A

Monolithic: smaller projects
Component: larger projects

24
Q

Describe this security principle:

Complete Mediation

A

Every access to every resource is checked which is reinforced by the reference monitor

25
Criteria of a reference monitor
* Unbypassable * Temper-proof * Verifiable
26
# Describe this security principle: Separation of Privilege
Dsitribution of function across multiple entities
27
# Describe this security principle: Defense in Depth
Multiple security measures that uses 2 of: * Something the user knows * Something the user has * Something the user is
28
Provide an example for each of the criterias of the Defense in Depth: * Something the user knows * Something the user has * Something the user is
Something the user knows: a password, code Something the user has: phone Something the user is: face/fingerprint
29
When dealing with human factors, what is one solution to complex password requirements?
A password manager that will store complex passwords but the user only has to remember one password to access the manager
30
# Define Psychological acceptability
Is it reasonable, understandable, and acceptable?
31
What should you be resilient to when thinking about security principles?
Variations in human behavior
32
What should you not overly rely on when thinking about security principles?
Don't overly rely on assumptions
33
What should you address when thinking about security?
The weakest link
34
List all of the Security Principles
* Know Your Threat Model * Economy of Security Mechanism * Open Design * Fail-Safe Defaults * Least Privilege * Separation of Privilege * Defense in Depth * Complete Mediation