Cyber Security Principles

Cyber Security Principles

Guiding Principles are aspirational, developed and delivered as a partnership between Government and ISPs.

Some of the essential cyber security principles are -

 Cyber Security Principles

Cyber Security Principles

  • Economy of mechanism
  • Fail-safe defaults
  • Least Privilege
  • Open Design
  • Complete mediation
  • Separation of Privilege
  • Least Common Mechanism
  • Psychological acceptability
  • Work Factor
  • Compromise Recording

Economy of mechanism

  • The Economy of mechanism principle simplifies the design and implementation of security mechanisms.
  • The checking and testing process is less complicated so that fewer components need to be tested.
  • Interfaces between security modules are the suspect area which should be as simple as possible.

Fail-safe defaults

  • Fail-safe defaults principle states that the default configuration of a system should have a conservative protection scheme.

Least Privilege

  • Principle states that a user should only have those privileges that need to complete his task.
  • If possible, the elevated rights of a user identity should be removed as soon as those rights are no longer needed.

Read Also

Open Design

  • Principle states that the security of a mechanism should not depend on the secrecy of its design or implementation.

Complete mediation

  • The principle of complete mediation restricts the caching of information, which often leads to simpler implementations of mechanisms.
  • The operating system should mediate all and every access to an object.

Separation of Privilege

  • This principle states that a system should grant access permission based on more than one condition being satisfied.
  • Two conditions must be met -
    • The user must know the root password.
    • The user must be in the right group (wheel).

Least Common Mechanism

  • This principle may also be restrictive because it limits the sharing of resources.

Psychological acceptability

  • The psychological acceptability principle recognizes the human element in computer security.
  • If security-related software or computer systems are too complicated to configure, maintain, or operate, the user will not employ the necessary security mechanisms.

Work Factor

  • This principle states that the cost of circumventing a security mechanism should be compared with the resources of a potential attacker when designing a security scheme.

Compromise Recording

  • Compromise Recording principle states that sometimes it is more desirable to record the details of intrusion that to adopt a more sophisticated measure to prevent it.

Related Searches to Cyber Security Principles