View Static Version
Loading

Cybersecurity First principles

Domain Separation

  • Domain is any collection of bits
  • Separation allows flexible policy enforcement

Process Isolation

  • Process is a program running on a computer
  • Isolation prevents tamper and interference

Resource Encapsulation

  • Computing resource: memory, disk, network bandwidth, etc
  • Encapsulation: Controlled access to resources

Least Privilege

  • Privilege: Right for the user to act on computer resources
  • Giving only necessary privileges creates accountability and prevents misuse

Layering

  • Layer: A level that an attacker has to clear to reach your data and programs
  • More layers slow down an attacker

Information Hiding

  • Only expose data necessary to carry out the users job
  • Log all access attempts

Abstraction

  • A simpler view of something complicated
  • Complexity can hide bugs and malicious behaviors

Simplicity

  • Easier to understand and analyze unwanted access paths
  • Configure the system correctly

Modularity

  • Compose independent and interchangeable components
  • Compartmentalization of function and failure

Minimization

  • Reduce the attack surface
  • Least functionality necessary

Credits:

Created with images by anyaberkut - "internet security and data protection concept, blockchain and cybersecurity" • 義美 前田 - "チューリップ。ひたちなか 茨城 日本。4月中旬。" • Erwan Hesry - "untitled image" • geralt - "registration login keyboard" • ivanacoi - "domino hand stop" • Henry & Co. - "untitled image" • markito - "solar eclipse sun blackout" • MikesPhotos - "bmw car vehicle" • mhoppsy - "cell phone cellular phone cellular" • aitoff - "stormtrooper skateboard lego" • Neil Soni - "untitled image"

NextPrevious

Report Abuse

If you feel that this video content violates the Adobe Terms of Use, you may report this content by filling out this quick form.

To report a copyright violation, please follow the DMCA section in the Terms of Use.