This lecture outlines key information security design principles, including isolation, encapsulation, modularity, layering, and least astonishment, aimed at protecting critical resources and managing attack surfaces. It defines attack surfaces as exploitable vulnerabilities and discusses categories such as network, software, and human attack surfaces. Additionally, it introduces attack trees as a method for analyzing security threats systematically.