LO1 Secure Design Principal 04
LO1 Secure Design Principal 04
Security
Secure design principal
Secure design principal
What if the information you received from IT systems could not be trusted to be accurate?
• Consistency • Relevance
Defense Model
• There are two approaches you can take to preserve the confidentiality, integrity, availability,
and authenticity of electronic and physical assets such as the data on your network:
• Build a defensive perimeter around those assets and trust everyone who has access inside
• Use many different types and levels of security controls in a layered defense-in-depth
approach
Lollipop model
Deterrent Signs, barbed Security policies Warning Visible guards Dynamic pop-
wire messages and cameras up warning
Compensative Manual
processes