Skip to content

Latest commit

 

History

History
72 lines (70 loc) · 6.31 KB

En-n-Latin-Principles-for-Cyber-Resiliency.md

File metadata and controls

72 lines (70 loc) · 6.31 KB

English and Latin Principles for Cyber Security

English Latin via Yandex
resist attack resistendum impetum
[resist attack] resist assault resistere impetu
[resist attacks] resist enemies resistere inimicis
[resist your attacker] resist your enemy resistere tua Inimicus
[resist your attacker] resist the enemy resistere hostis
trust is earned fiducia est, meruit
individuals need to earn trust singuli necessaria ad earn fiducia
agents need to earn trust agentia necesse est ut earn fiducia
individuals need to earn admittance singuli necessaria ad earn aditus
protect all entry points tueri omnes introitu puncta
all entring information is evil omnes entring notitia est malum
[validate all input]validate all entering information convalidandum et ad omnes ingressus notitia
[validate all input]validate all incoming information convalidandum omnia advenientis notitia
validate all the entry points convalidandum omnes introitu puncta
all entering information requires validation omnes ingressus notitia requiritur radice
all incoming information requires validation omnes advenientis notitia requiritur radice
reveal little revelare parum
share little partem parum
remain silent taceat
Control visibility and use Imperium turpis et uti
Contain and exclude behaviors Continent et excludit partum
Support agility Subsidium agilitatem
Expect adversaries to evolve Sperare adversarios ad mutatio
ensure safe string handling curare tutum tractatio chorda
disguise secrets dissimulare secreta
make sensitive information secret facere sensitiva notitia et secretum
make sensitive information invisible facere sensitiva notitia invisibilis
disguise sensitive information dissimulare sensitiva notitia
mitigate risks diminuendum periculum
use care when accepting risks uti cura, cum accipere extrema temptaturum
[Reduce attack surfaces]reduce your surface redigo vestri superficies
Limit the need for trust Terminum opus fiducia
Layer and partition defenses Accumsan et partition defensionibus
Maintain redundancy Esse nugatio
Maintain situational awareness Esse situational notitia
Maximize transience; minimize persistence Maximize celeritas; minimize perseverantia
more transience; less persistence magis celeritas; minus perseverantia
employ deception uti dēcipiō
use deception uti deceptio
employ isolation uti segregationem
use isolation uti segregationem
concentrate on common critical assets incumbo in communi discrimine bona
concentrate on common critical systems incumbo in communi discrimine ratio
understand every tradeoff intelligere omnis compromissum
understand every compromise intelligere omnis compromissum
instrument sensitive transactions instrumentum sensitiva rebus
handle exceptions tractare exceptiones
enforce access control exigendum accessum imperium
enforce strong passwords exigendum tesserae
use two-factor authentication uti duo factor authenticas
employ two-factor authentication uti duo factor authenticas
require two-factor authentication requirit duo factor authenticas
require multi-factor authentication requiram multiplex factor authenticas
establish thresholds for authentication events statuam limina pro authenticas rerum
establish thresholds for authorization events statuam limina pro auctoritate rerum
authenticate messages authenticitatis nuntius
authenticate requests authenticitatis petitionem
use reputation analysis uti fama analysis
employ traffic analysis utuntur negotiationis analysis
[study the certificate]certificate analysis studium testimonium
employ allow list[s] uti patitur album
employ deny list[s] uti negare album
monitor every platform monitor omnis diam
resist persistence resistere perseverantia

I started this list when my peer Jason Battani was creating certificates for a set application security assessments. Thank you Jason.
Some verification via https://www.perseus.tufts.edu/hopper/search