FT Cyber Security Resources - G. Porter
Section outline
-
The intent of this Knowledge Unit is to provide students with basic security design fundamentals that help create systems that are worthy of being trusted.
-
1.5.1 Topics(s)
-
Separation (of domains)
-
Isolation
-
Encapsulation
-
Least Privilege
-
Simplicity (of design)
-
Minimization (of implementation)
-
Fail Safe Defaults / Fail Secure
-
Modularity
-
Layering
-
Least Astonishment
-
Open Design
-
Usability
-
1.5.2 Outcome(s): Students will be able to:
____ List the first principles of security
____ Describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies
____ Analyze common security failures and identify specific design principles that have been violated
____ Identify the needed design principle when given a specific scenario
____ Describe why good human machine interfaces are important to system use
____ Understand the interaction between security and system usability and the importance for minimizing the affects of security mechanisms
-