Module 3: Secure Application Design and Architecture
1.Which security design principle minimize the risk by reducing the number of entry point in an application? A) Apply Defence in depth B) Security through Obscurity C) Reduce Attack Surface D) Fail Securely 'Apply Defence in depth' is a principle that suggests multiple levels of security controls should be placed throughout an IT system. 'Security through Obscurity' is a principle that suggests security can be achieved by hiding the system or system's design. 'Fail Securely' is a concept where an application should handle errors by shifting to a state that prevents unintended access or data exposure. 2.In which threat modelling phase application is decomposed , and its entry points are reviewed from an attacker's perspective ? A) Control Recommendations B) Impact Analysis C) Threat Identification D) Attack Surface Evaluation Control Recommendations phase involves the process of recommending controls to deal with potential threats. Impact Analysis in...