FSDP
FSDP
FSDP
• Easier to test and verify thoroughly. • In huge design, attackers can have
many more opportunities for an
adversary to discover subtle
• Simple mechanisms tend to have weakness.
fewer exploitable flaws and requires
less maintenance.
• The more likely the mechanism, the
• Configuration management issues are more likely it is to posses exploitable
simplified, updating (or) replacing a flaws.
simple mechanism becomes a less
intensive process.
Fail – Safe Defaults
Least Privilege
• Role-based access control.
– Student
– Staff
– Vice – Chancellor
– Director
Least Common Mechanism
Encapsulation
• Specific form of isolation based on object oriented functionality.
• Modularity
• Least Astonishment
Attack Surfaces and Attack Trees
• Attack Surface
• Examples
• Open Ports
• Services available inside the firewall
• Interfaces, SQL and Web forms
• Code that processes incoming data, email, XML documents
• An employee with access to sensitive information
• Attack surfaces can be categorized as follows :
• Included in this category are network protocol vulnerabilities, used for DoS
attacks, Disruption of Communication Links and various forms of intruder attacks.
SN4 SN5
• Leaf node initiates an attack.
• Each node other than leaf node is either represented by an AND node and
OR node.