Question: Attempt Score 0 / 1 - F Overall Grade ( Highest Attempt ) 0 / 1 - F Question 1 0 / 1 point Match
Attempt Score
F
Overall Grade Highest Attempt
F
Question point
Match each description on the left with the corresponding term on the right.
Series of checks and balances to make sure the entire system is secured from multiple perspectives
Assurance that an entity only has the minimal amount of privileges to perform their duties
The theory that unless a subject is given explicit access to an object, it should be denied access to that object
The breaking down of larger tasks into smaller, more manageable tasks
Encapsulation
FailSafe DefaultsFail Secure
Isolation
Layering
Least Privilege
Modularity
Hide question feedback
These are key concepts specific to the set of best practices of secure design, which are introduced in this course. Print out or save your glossary to your Playbook for current and future reference moving forward.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
