SSS811S - SECURE SYSTEMS - 1ST OPP - JUNE 2024


SSS811S - SECURE SYSTEMS - 1ST OPP - JUNE 2024



1 Page 1

▲back to top


nAmlBIA UnlVERSITY
0 F SCIEnCEAnD TECHn OLOGY
Facultyof Computingand
Informatics
Schoool f Computing
Departmenot f Software
Engineering
13JacksonKaujeuaStreet
PrivateBag13388
Windhoek
NAMIBIA
T; +264612072052
F: +264612079052
E: dse@nust.na
W:www.nust.na
DEPARTMENTOF SOFTWAREENGINEERING
QUALIFICATION:BACHELOROF COMPUTERSCIENCE(HONS SOFTWAREDEVELOPMENT)
QUALIFICATIONCODE:08BCHS
LEVEL:8
COURSE:SECURESYSTEMS
COURSECODE:SSS811S
DATE:JUNE 2024
SESSION:THEORY
DURATION: 3 HOURS
MARKS: 100
FIRSTOPPORTUNITYEXAMINATION QUESTIONPAPER
EXAMINER (S}
MR ARPIT JAIN
MODERATOR:
MR PALl<ESHl(ATARIA
THE QUESTIONPAPERCONSISTSOF 2 PAGES
(Including this front page)
INSTRUCTIONS
1. Answer ALL the questions.
2. Write clearly and neatly.
3. In answering questions, be guided by the allocated marks.
4. Number your answers clearly following the numbering used in this
question paper.
PERMISSIBLEMATERIALS
1. None

2 Page 2

▲back to top


Question 1
[20)
(a} What are Cyber Kill Chain stages?Explain the attack example for each stage of the Cyber kill
Chain.
'[10]
(b} Provide two examples of defence techniques you can implement at each of the following stages
of a Cyber Kill Chain.
[10]
Question 2
[20)
(a) How do the threat actors carry out their attack? Explain the attack methods
[10]
(b) Explain the design for insider risk?
[10]
Question 3
[20)
(a) Explain CIATriad in the context of reliability and security.
[10]
(b) While implementing the least privilege model, what are the best practices that need to be
followed?
[10]
Question 4
[20)
(a) Explain the design principle for Recovery.
[10]
(b) What is the motivation for the attackers?
[10]
Question 5
[20)
(a) What is Trojan Horse? Explainthe stages ofTrojan Horse.
[10)
(b) What do you mean by controlling the blast radius?
[10)