.,
Question 1
Complexity often accumulates inadvertently, but this can lead to tipping-point situations
where a small and apparently innocuous change has major consequences for a system's
reliability or security. Outline and explain four (4) architecture decisions you can take to
make changes to your system easier?
[IO marks]
Question 2
The following concepts are usually considered when designing for insider risk. Please explain
what each concept means in the context of system design and outline how each concept is
used in the mitigation of insider risk.
a. Three-Factor Authorization (3FA)
[4 marks]
b. Zero Trust
[4 marks]
c. Multi-Party Authorization
[4 marks]
d. Business Justification
[4 marks]
e. Auditing and Detection
[4 marks]
Question 3
What benefit does threat intelligence provide to system defenders when defending against
adversaries. Outline and explain three (3) forms of threat intelligence that one can find.
[IO 'marks]
Question 4
Provide two examples of defence techniques you can implement at each of the following
stages of a Cyber Kill Chain. [2 Marks for listing, 4 Marks for an explanation of defence
technique]
a. Reconnaissance: The attacker uses a search engine to find the email addresses
of employees at a target organization.
[4 marks]
b. Entry: Attacker sends phishing emails to employees that lead to compromised
account credentials. The attacker then signs into the organization's virtual
private network (VPN) service using those credentials.
[4 marks]
c. Lateral Movement: Attacker remotely logs in to other systems using the
compromised credentials.
[4 marks]
2