/
First Principles of Cybersecurity First Principles of Cybersecurity

First Principles of Cybersecurity - PowerPoint Presentation

stefany-barnette
stefany-barnette . @stefany-barnette
Follow
342 views
Uploaded On 2019-12-02

First Principles of Cybersecurity - PPT Presentation

First Principles of Cybersecurity Minimization Minimizations goal is to simplify and decrease the number of ways the software can be exploited Simplicity If something is less complicated its less likely to have problems and easier to troubleshoot and fix ID: 768933

resources information processes process information resources process processes layer keeping prevents people

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "First Principles of Cybersecurity" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

First Principlesof Cybersecurity

Minimization Minimization’s goal is to simplify and decrease the number of ways the software can be exploited.

Simplicity If something is less complicated, it’s less likely to have problems and easier to troubleshoot and fix.

Abstraction A fancy word for summarizing or explaining in a way that can be easily understood.

Information Hiding Any attempt to prevent people from being able to see information.

Least Privilege Limits what access people have to your resources and what they can do with them.

Modularity Able to be inserted or removed from a project; each module has its own function, interchangeable with other modules.

Layering Multiple layers of defense protect information. If one layer is defeated, the next layer should catch it.

Resource Encapsulation Resources – hardware, system objects, or processes – must be separated and used as intended.

Process Isolation A process occurs when a task is executed. Keeping processes separate prevents the failure of one process from negatively impacting another.

Domain Separation Separating areas where resources are located prevents accidents and loss of data, keeping information worlds from colliding.