Question: Attempt Score 0 / 1 - F Overall Grade ( Highest Attempt ) 0 / 1 - F Question 1 0 / 1 point Match

Attempt Score
0/1- F
Overall Grade (Highest Attempt)
0/1- F
Question 10/1 point
Match each description on the left with the corresponding term on the right.
__2__
Series of checks and balances to make sure the entire system is secured from multiple perspectives
__3__
Assurance that an entity only has the minimal amount of privileges to perform their duties
__6__
The theory that unless a subject is given explicit access to an object, it should be denied access to that object
__4__
The breaking down of larger tasks into smaller, more manageable tasks
1.
Encapsulation
2.
Fail-Safe Defaults/Fail Secure
3.
Isolation
4.
Layering
5.
Least Privilege
6.
Modularity
Hide question 1 feedback
These are key concepts specific to the set of best practices of secure design, which are introduced in this course. Print out or save your glossary to your Playbook for current and future reference moving forward.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!