Security Questions Answer the following questions below. 1. Describe a software or hardware system you have interacted with that violated a design principle (Principle of open design, Principle of...

1 answer below »
Please see the attached filed.





Security Questions Answer the following questions below. 1. Describe a software or hardware system you have interacted with that violated a design principle (Principle of open design, Principle of sweeping simplifications, Principle of design for iteration, Principle of least astonishment). What principle did it violate? 2. Describe a security policy from an organization you have interacted with recently. What was one of the mechanisms used to enforce a part of the security policy. 3. Describe a piece of software you think has a reference monitor or should have a reference monitor. What are some of the access points that need to be monitored by the reference monitor? 4. Find a service on the web that allows signing of documents. Does the service use PKI for signing? If not, why not? In what ways is the service less secure than PKI?
Answered 1 days AfterDec 09, 2021

Answer To: Security Questions Answer the following questions below. 1. Describe a software or hardware system...

Neha answered on Dec 11 2021
122 Votes
Question 1
Least Privilege: the principle of least privilege can be defined as a security concern in which the u
ser is provided minimum level of the permissions or access as required to perform the job functions. It is widely considered to be the best practice in cyber security, and it is the fundamental step to protect privileged access for high value data.
Minimizing Secrets: it is the principle to reuse needless size, burdensome answers and complexity instead of burning resources to secure ever expanding systems and the data set it is a good practice to reduce their usage and make the job easier for practitioner.
Fail-Safe- The principle of field safe states that unless the subject is given explicit access to the object it should be denied access for that object. The principle needs that the default access for the object is none.
Least Astonishment: this principle is the important factor in user interface design and software design. It is used to make sure that the component of the system is behaving in the manner that most of the users expect it to behave.
Open Design: The principle of open design states that...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here