Security_Design_Principles_Presentation.pptx

asrarmushtaq1995 0 views 13 slides Oct 13, 2025
Slide 1
Slide 1 of 13
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13

About This Presentation

Questions about the CIA Triad:
What is the CIA triad?
What does confidentiality mean in information security?
What does integrity mean in information security?
What does availability mean in information security?
Can you provide an example of a breach of confidentiality?
How can data integrity be pr...


Slide Content

Security Design Principles An overview of key principles for building secure systems (Class Presentation)

Introduction Security Design Principles are basic rules for building secure systems. They protect data, prevent misuse, and reduce cyberattack risks. These apply to software, networks, and organizational security.

Least Privilege Give users only the access they need. Limits damage if an account is compromised. Example: A cashier can access sales data, not salaries.

Defense in Depth Use multiple layers of security for protection. If one layer fails, others still defend the system. Example: Firewall + antivirus + strong passwords.

Fail-Safe Defaults Deny access by default unless specifically allowed. Systems should stay secure even when errors occur. Example: Login errors should block access, not allow it.

Separation of Duties Divide responsibilities among different people or systems. Prevents fraud and insider misuse. Example: One person requests, another approves payment.

Economy of Mechanism Keep security systems simple and clear. Simple systems are easier to test and maintain. Example: Simple login systems reduce vulnerabilities.

Complete Mediation Check permissions every time a resource is accessed. Don’t assume access remains valid. Example: Verify access for every file read/write.

Open Design Security should not depend on hidden designs. Transparency helps experts find and fix weaknesses. Example: Open-source code allows public security review.

Least Common Mechanism Avoid sharing common resources unnecessarily. Reduces risk of one user affecting others. Example: Separate memory or file spaces per user.

Psychological Acceptability Security features should be easy to use. If too hard, users will ignore or disable them. Example: Use fingerprint or password managers.

Security by Design Include security in all stages of development. Identify threats early using threat modeling. Prevention is cheaper than fixing later.

Conclusion Security Design Principles build trust and reliability. They protect systems from attacks and misuse. Security should always be part of the design process.
Tags