Please enable JavaScript.
Coggle requires JavaScript to display documents.
References, Sc00py Terms - Coggle Diagram
References
Hale, M., Ghandi, R., & Morrison, D. (2021). Introduction to Cybersecurity First Principles.
https://mlhale.github.io/nebraska-gencyber-modules/intro_to_first_principles/README/
TechTarget. (2021). Class.
https://www.techtarget.com/whatis/definition/class#:~:text=In%20object%2Doriented%20programming%20%2C%20a,real%20values%20instead%20of%20variables
.
Dantoni, J. (2022). Open Architecture Defined: Advantages & When to Consider. NetSuite.
https://www.netsuite.com/portal/resource/articles/data-warehouse/open-architecture.shtml#:~:text=In%20terms%20of%20computer%20systems,or%20change%20the%20original%20designs
.
Computer Hope. (2017). Inheritance.
https://www.computerhope.com/jargon/i/inheritance.htm
Sc00py Terms
Domain Separation
A Domain is a collection of data or instructions that warrant protection (Hale et al., 2021).
Separating domains allow enforcement of the rules governing the entry and use of domains by entities outside the domain (Hale et al., 2021).
Process Isolation
A process is a program running on a computer, which each has a region of the memory address space which it can access (Hale et al., 2021).
Isolating the process address space from other address space prevents tampering by other processes(Hale et al., 2021).
Data Hiding
Data hiding contribute to cybersecurity by only allowing the necessary aspects of a data structure or record to be observed/accessed (Hale et al., 2021).
Resource Encapsulation
A resource can be the memory, disk, drive, network, bandwidth, battery power or monitor(Hale et al., 2021). It also can be system object such as shared memory or a link list data structure
Layering
A layer is a separate level that must be conquered by an attacker to breach a system (Hale et al., 2021).
Simplicity
Simplicity helps cybersecurity by having a lack of complexity to allow system designers and programmer to identify unwanted access paths(Hale et al., 2021). It is easy to translate general protection goals to appropriate system security configurations
Modularity
Modularity is a design technique that separated the function of a program into independent components (Hale et al., 2021). Each component is self-sufficient and capable of executing unique parts of the desired functionality through interfaces (Hale et al., 2021).
Abstraction
Abstraction is when something complicated can be thought of and represented on more simple terms. Every model is an abstraction because they reduce the complexity of an object into something that is understandable (Hale et al., 2021).
Minimization
Minimization is where something has the least functionality necessary in a program or device (Hale et al., 2021). This helps decrease the number of ways which attackers can exploit a program.
Least Privilege
A privilege is a right for the user to act on managed computer resource (Hale et al., 2021). One that is minimized would grant a user for accomplishing assigned duties improves accountability and limits accidental misuse (Hale et al., 2021).
Encapsulation
Encapsulation is in object-oriented programming. The goal is to allow access of the class data in only the ways the designer intended (Hale et al., 2021).
Class
A class is a template definition of the methods and variables in a particular kind of object (TechTarget, 2021).
Inheritance
Inheritance refers to the ability of an object to take on one or more characteristics from other classes of objects (Computer Hope, 2017).
Defense Layering
. It slows down an attacker that needs to conquer each layer before continuing onto the next (Hale et al., 2021).
Open Design
Open design refers to products whose designs and specifications are publicly available, making it easier for developers other than the products' original designers to build compatible products or change the original designs (Dantoni, 2022).