explain in few sentences how each of these heuristics applies to security

explain in few sentences how each of these heuristics applies to security