Information_Security_Lecture_2
Information_Security_Lecture_2
ATTOCK CAMPUS
SECURITY DESIGN PRINCIPLES
INTRODUCTION TO SECURITY DESIGN
2. Why is it Important?
• Prevents cyber threats and vulnerabilities.
3. Where is it Applied?
• Software, networks, databases, cloud computing, etc.
SECURITY DESIGN PRINCIPLES OVERVIEW
• Definition: Users should have the minimum access needed to perform tasks.
• Example: A bank cashier should not access customer financial records.
PRINCIPLE 2 - SEPARATION OF DUTIES:
Definition: Hiding security mechanisms can provide an extra layer of security but is not a
primary defense.
Example: Changing default SSH ports for security.
REAL-WORLD EXAMPLES