Question 1
(a) What are the defence techniques you can implement with different stages of a Cyber Kill Chain?
[10 Marks]
(b) Explain CIA Triad in the context of reliability and security,
[10 Marks]
Question 2
(a) What is Threat modelling and Vulnerability discovery?
(b) Explain the design for insider risk?
(10 Marks]
(10 Marks]
Question 3
(a) How to classify access based on risk and examine best practices that enforce least privilege.
(10 Marks]
(b) What is the Policy Framework for Authentication and Authorisation Decisions?
(10 Marks]
Question 4
(a) How do you change your design while changing the landscape?
(b) What is the complication of arriving when the plan changes?
(10 Marks]
(10 Marks]
Question 5
(a) What are the techniques to deploy the response mechanism?
[10 Marks]
(b) What are the design principles for the system to be resilient under adverse or unexpected
circumstances?
(10 Marks]
---------------- END OF EXAMINATION----------------
2