SSS811S - SECURE SYSTEMS - 2ND OPP - JULY 2023


SSS811S - SECURE SYSTEMS - 2ND OPP - JULY 2023



1 Page 1

▲back to top


nAml BIA UnlVERSITY
OF SCIEnCE AnDTECHnOLOGY
Facultyof Computingand
Informatics
Schoolof Computing
DepartmentofSoftware
Engineering
13JacksonKaujeuaStreet
PrivateBag13388
Windhoek
NAMIBIA
T: +264612072052
F: +264612079052
E: dse@nust.na
W: www.nust.na
DEPARTMENTOF SOFTWAREENGINEERING
QUALIFICATION:BACHELOROF COMPUTER SCIENCE(HONS SOFTWAREDEVELOPMENT)
QUALIFICATIONCODE:08BCHS
LEVEL:8
COURSE:SECURESYSTEMS
COURSECODE:5558115
DATE:JULY2023
SESSION:THEORY
DURATION:3 HOURS
MARKS: 100
SECONDOPPORTUNITY/ SUPPLEMENTARYEXAMINATION QUESTION PAPER
EXAMINER (S)
MR ARPIT JAIN
MODERATOR:
MR NDANGI NASHIKU
THE QUESTION PAPERCONSISTSOF 2 PAGES
(Including this front page)
INSTRUCTIONS
1. Answer ALL the questions.
2. Write clearly and neatly.
3. In answering questions, be guided by the allocated marks.
4. Number your answers clearly following the numbering used in this
question paper.
PERMISSIBLEMATERIALS
1. None

2 Page 2

▲back to top


Question 1
[20]
What are the defence techniques you can implement with different stages of a Cyber Kill Chain?
Question 2
[20]
What is Threat modelling and Vulnerability discovery?
[10]
How can you architect your infrastructure and processesto be responsive to the inevitable changes
you'll face?
[10]
Question 3
[20]
How to classify access based on risk and examine best practices that enforce least privilege.
[10]
What are the Policy Framework for Authentication and Authorization Decisions
[10]
(a) How do you change your design while changing the landscape?
[10]
(b) What is the complication arriving when plan changes?
[10]
Question 5
[20]
(a) What are the techniques to deploy the response mechanism?
[10]
(b) What are the design principles for the system to be resilient under adverse or unexpected
circumstances
[10]
I•