Learning outcome 4
Given a specific scenario, identify and apply the design principles involved or needed.
Skill drills that assess this outcome
- CSCD240-E1-A-Q40 primary essay evaluation-order sort data.txt > data.txt — what happens to data.txt and why?
- CSCD240-E1-A-Q41 primary essay setuid Explain the setuid bit in 1-2 sentences using the term "effective user ID".
- CSCD240-E1-B-Q17 primary essay evaluation-order sort auth.log > auth.log — what happens, one-sentence why?
- CSCD240-E1-C-Q40 primary scenario evaluation-order sort /var/log/audit.log > /var/log/audit.log — state and why.
Other outcomes in CD-CSP
- CD-CSP-O1 Differentiate and discuss the principles of cybersecurity.
- CD-CSP-O2 Describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies.
- CD-CSP-O3 Analyze common security failures and identify specific design principles that have been violated.
- CD-CSP-O5 Understand the interaction between security and system usability and the importance for minimizing the effects of security mechanisms.