πŸ“š Exam Prep Β· Application Security

Application Security
Complete Study Material

⚠ Exam Tomorrow Unit 2 β€” Vulnerabilities & Risk Unit 3 β€” Incident Response Extra Topics 10 Marks / Question
UNIT 2Vulnerabilities & Risk Assessment

Application security risks, types of vulnerable applications, and OWASP Top 10 vulnerabilities. Each answer below is structured for 10-mark depth.

Q1
What is Application Security? Explain the types of applications that require security.
10 Marks
β–Ύ

Definition

Application Security is the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access, data breaches, and malicious manipulation.

Application security is critical across all software types as attackers increasingly target apps to exploit sensitive user data, disrupt services, or gain unauthorized access.

Types of Applications Requiring Security

  1. Web Applications: Accessible via browsers and are high-risk targets. Common threats include SQL Injection (SQLi), Cross-Site Scripting (XSS), and session hijacking. Because they are publicly accessible, they represent the largest attack surface.
  2. Mobile Applications: Run on Android/iOS devices and require protection for locally stored data, secure API communication, and prevention of reverse engineering or tampering of the APK/IPA binary.
  3. Cloud Applications: Includes SaaS, PaaS, and IaaS platforms. Security concerns include misconfigured storage buckets, improper access controls, and insecure data transmission between cloud services.
  4. API-Driven Applications: APIs enable communication between different systems. They are critical targets for data interception and unauthorized access if not properly authenticated and rate-limited.
  5. Containerized Applications: Applications running in Kubernetes or Docker environments. They need protection against container escape vulnerabilities, image tampering, and misconfigured container permissions.
  6. IoT (Internet of Things) Applications: Software that controls smart devices (cameras, sensors, smart home equipment). Often lacks robust security, making them vulnerable to malware and botnet recruitment.
  7. Desktop Applications: Software installed directly on endpoints. May handle sensitive user data and can be vulnerable to local privilege escalation, insecure storage, and reverse engineering.
Key Point for Exam: Each application type faces unique threats. Web apps face injection/XSS; mobile apps face reverse engineering; cloud faces misconfiguration; IoT lacks built-in security mechanisms.
Q2
What are Application Security Risks? Explain the OWASP Top 10 risks in detail.
10 Marks
β–Ύ

Definition

Application Security Risks are vulnerabilities in software that allow attackers to compromise data, disrupt services, or gain unauthorized access. The OWASP (Open Web Application Security Project) publishes the Top 10 most critical risks.

OWASP Top 10 β€” Official Mapping Diagram

OWASP Top 10 2021 β€” Official Mapping from 2017 to 2021
OWASP Top 10 2021 Mapping Diagram

Image unavailable offline β€” see owasp.org/Top10

Source: owasp.org/Top10 (official)

OWASP Top 10 Application Security Risks

#RiskDescriptionExample
1Broken Access ControlRestrictions on authenticated users are improperly enforced, allowing attackers to access unauthorized functionality or data.A normal user accessing admin pages by modifying the URL.
2Cryptographic FailuresInadequate protection of sensitive data (financial, PII) due to weak encryption or poor key management.Storing passwords in plain text or using MD5 hashing.
3Injection FlawsUntrusted data is sent to an interpreter as a command. Includes SQL, NoSQL, OS, LDAP injections.SQL Injection: ' OR '1'='1 bypasses login.
4Insecure DesignFlaws in the application's architecture that cannot be fixed by implementation alone β€” requires secure design from the start.No rate-limiting on password reset, allowing brute force.
5Security MisconfigurationInsecure default configurations, open cloud storage, misconfigured HTTP headers, or unnecessary features enabled.Default admin credentials left unchanged on a server.
6Vulnerable & Outdated ComponentsUsing libraries, frameworks, or software components with known security weaknesses (unpatched CVEs).Using an old version of OpenSSL with Heartbleed vulnerability.
7Identification & Authentication FailuresWeaknesses that allow attackers to compromise passwords, keys, or session tokens to assume user identities.No multi-factor authentication, allowing credential stuffing attacks.
8Software & Data Integrity FailuresCode or infrastructure that does not protect against integrity violations, such as insecure CI/CD pipelines or untrusted update mechanisms.Attacker injects malicious code into a software update.
9Security Logging & Monitoring FailuresInsufficient detection, logging, and alerting that prevents timely response to breaches.No logs of failed login attempts, so a brute-force attack goes undetected.
10Server-Side Request Forgery (SSRF)The application fetches a remote resource without validating the user-supplied URL, allowing attackers to target internal systems.An attacker forces the server to access internal metadata service at 169.254.169.254.
Mitigation Strategy: Proactive security testing (penetration testing, code reviews) and secure coding practices (input validation, parameterized queries, least-privilege access) are essential to mitigate these risks.
Q3
Explain Injection Flaws and Broken Access Control with examples.
10 Marks
β–Ύ

1. Injection Flaws

Injection flaws occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
  • SQL Injection (SQLi): Malicious SQL statements inserted into an input field.
    Example: Login form input ' OR '1'='1' -- bypasses authentication by making the SQL query always true.
  • NoSQL Injection: Targets NoSQL databases like MongoDB using JSON-based payloads.
  • OS Command Injection: Attacker runs system-level commands through the application.
  • LDAP Injection: Manipulates LDAP queries to bypass authentication or access directory information.

Prevention: Use parameterized queries / prepared statements, input validation, and least-privilege database accounts.


2. Broken Access Control

Broken Access Control occurs when restrictions on what authenticated users are allowed to do are not properly enforced, allowing attackers to access unauthorized functionality or data.
  • Horizontal Privilege Escalation: User A accesses User B's data by changing a URL parameter (e.g., /account?id=1002 β†’ /account?id=1003).
  • Vertical Privilege Escalation: A regular user accesses admin-only functionality by guessing or manipulating URLs.
  • Insecure Direct Object Reference (IDOR): Application exposes internal implementation objects (file names, database keys) directly.
  • Missing Function-Level Access Control: APIs don't enforce access controls on sensitive endpoints.

Prevention: Deny access by default, enforce access control server-side, log access violations, and regularly test access controls.

Q4
Describe Cryptographic Failures, Security Misconfiguration, and SSRF vulnerabilities.
10 Marks
β–Ύ

1. Cryptographic Failures

Previously called "Sensitive Data Exposure." Relates to failures in cryptography that lead to exposure of sensitive data such as passwords, credit card numbers, health records, or personal information.
  • Transmitting data in plain text (using HTTP instead of HTTPS).
  • Using weak or deprecated cryptographic algorithms (MD5, SHA1, DES).
  • Poor key management β€” hardcoded keys in source code.
  • Not enforcing encryption at rest for sensitive database fields.

Prevention: Use strong algorithms (AES-256, RSA-2048), enforce HTTPS/TLS, store passwords using bcrypt/scrypt/Argon2, and properly manage encryption keys.


2. Security Misconfiguration

The most commonly seen issue. Results from insecure default configurations, incomplete configurations, open cloud storage, misconfigured HTTP headers, or verbose error messages.
  • Default credentials not changed (admin/admin).
  • Unnecessary features, ports, services enabled.
  • Verbose error messages revealing stack traces to users.
  • Open S3 buckets in cloud environments exposing sensitive files.
  • Missing security headers like Content-Security-Policy, HSTS.

Prevention: Harden configuration, disable unused features, automate configuration audits, and regularly review cloud resource permissions.


3. Server-Side Request Forgery (SSRF)

SSRF flaws occur when a web application fetches a remote resource based on user-supplied input without validating the URL. This lets attackers force the server to make requests to unintended locations β€” including internal systems.
  • Attacker provides URL pointing to internal services: http://192.168.1.1/admin
  • Access cloud metadata services: http://169.254.169.254/latest/meta-data/ (common in AWS)
  • Can be used to scan internal networks, bypass firewalls, or access credentials.

Prevention: Validate and sanitize all client-supplied URLs, use allowlists for permitted domains, disable HTTP redirections, and enforce network segmentation.

UNIT 3Incident Response Planning

Cyber Incident Response lifecycle, phases, planning steps, technologies, and strategies β€” structured for 10-mark exam answers.

Q5
What is Cyber Incident Response? Explain its importance and common types of cyber incidents.
10 Marks
β–Ύ

Definition

Cyber Incident Response (CIR) is a structured and systematic approach used by organizations to detect, manage, and recover from cybersecurity incidents that threaten the confidentiality, integrity, or availability of information systems.

A cyber incident may include events such as malware infections, ransomware attacks, phishing campaigns, data breaches, insider threats, or Distributed Denial-of-Service (DDoS) attacks.

Main Goal

To minimize damage, reduce recovery time and costs, protect organizational reputation, and prevent similar incidents from occurring in the future β€” following the NIST lifecycle model.

Common Types of Cyber Incidents

Malware AttacksRansomwarePhishingData BreachesDDoS AttacksInsider ThreatsUnauthorized Access
  1. Malware Attacks: Malicious software (viruses, trojans, ransomware, spyware) that disrupts, damages, or gains unauthorized access to systems.
  2. Phishing & Social Engineering: Deceptive emails or messages that trick users into revealing credentials or installing malware.
  3. Data Breaches: Unauthorized access to confidential data β€” customer records, financial info, intellectual property.
  4. DDoS (Distributed Denial of Service): Floods a server or network with traffic from multiple sources to make services unavailable.
  5. Insider Threats: Malicious or negligent actions by employees, contractors, or business partners with internal access.
  6. Unauthorized Access: An attacker gains access to systems, networks, or data without permission β€” often through stolen credentials.

Why Incident Response is Important

  • Reduces financial losses from breaches, downtime, and regulatory fines.
  • Protects organizational reputation by demonstrating control and responsibility.
  • Ensures legal and regulatory compliance (GDPR, HIPAA, ISO 27001).
  • Minimizes downtime and business disruption.
  • Improves future security posture through lessons learned.
Q6
Explain the phases of the Incident Response lifecycle (NIST model) in detail.
10 Marks
β–Ύ

NIST Incident Response Lifecycle

The National Institute of Standards and Technology (NIST) recommends a lifecycle (SP 800-61) that provides a structured, cyclical approach to handling cybersecurity incidents.
NIST SP 800-61 β€” Official Incident Response Lifecycle Diagram
NIST Incident Response Lifecycle

Image could not load. Refer to NIST SP 800-61r2, Figure 3-1.

Source: NIST SP 800-61r2 β€” csrc.nist.gov
Phase 1
Preparation
Develop IR plan, train staff, deploy monitoring tools (SIEM, IDS), define communication channels. Build the foundation BEFORE incidents occur.
Phase 2
Identification
Detect suspicious activity, analyze logs, confirm whether an incident occurred, determine scope and impact. Collect and interpret evidence.
Phase 3
Containment
Isolate affected systems, disable compromised accounts, prevent further spread. Short-term and long-term containment strategies.
Phase 4
Eradication
Remove malware, patch vulnerabilities, close security gaps. Ensure the root cause is completely eliminated from the environment.
Phase 5
Recovery
Restore systems from backups, monitor for recurring issues, return to normal operations. Verify systems are clean before bringing back online.
Phase 6
Lessons Learned
Document the incident, conduct a post-mortem review, update the plan and controls to prevent recurrence and improve future responses.

Detailed Phase Breakdown

  1. Preparation: This is the most important phase. Develop an incident response policy, create playbooks for common threats (ransomware, phishing), define roles and responsibilities, train the CSIRT, and deploy SIEM/IDS tools.
  2. Identification: Monitor systems continuously. When an alert fires, analysts determine if it's a true positive incident β€” not just a false alarm. They analyze logs, network traffic, and user behavior to determine the scope and severity.
  3. Containment: Act quickly to prevent the incident from spreading. This may involve isolating affected machines from the network, blocking malicious IPs, or disabling compromised user accounts.
  4. Eradication: After containment, fully remove the threat. This includes deleting malware, patching the exploited vulnerability, resetting compromised credentials, and closing entry points.
  5. Recovery: Restore affected systems from clean backups and bring services back online in a controlled manner. Monitor closely for any signs of re-infection.
  6. Lessons Learned: After recovery, the team holds a review meeting to document what happened, how it was handled, what worked, and what needs improvement. The IR plan is updated accordingly.
Remember: The lifecycle is cyclical β€” Lessons Learned feeds back into better Preparation for future incidents.
Q7
Describe the steps/process of Incident Response Planning in detail.
10 Marks
β–Ύ

Definition

Incident Response Planning is the process of creating a comprehensive, documented plan that guides an organization in detecting, responding to, and recovering from cybersecurity incidents in a structured and effective manner.

10 Steps of Incident Response Planning

  1. Establish Objectives and Scope: Define what the plan aims to protect (data, systems, networks). Identify critical assets and business priorities. Determine which types of incidents are covered (malware, insider threats, DDoS, etc.).
  2. Develop an Incident Response Policy: Create a formal policy approved by senior management. Define authority levels and decision-making structure. Align with standards such as NIST SP 800-61 or ISO/IEC 27035.
  3. Form the Incident Response Team (IRT): Assign clear roles β€” Incident Manager, Security Analysts, IT Support, Legal & Compliance, Communication/PR. Define contact details and escalation paths for each role.
  4. Identify Critical Assets and Risks: Conduct risk assessments to identify vulnerabilities and potential threats. Prioritize systems based on their impact and sensitivity to the organization.
  5. Develop Response Procedures and Playbooks: Create step-by-step procedures for common incident types (ransomware, phishing, data breach). Include containment, eradication, and recovery instructions. Define evidence handling procedures (chain of custody for forensics).
  6. Implement Detection and Monitoring Tools: Deploy SIEM systems, Intrusion Detection Systems (IDS), and Endpoint Detection & Response (EDR). Set up alert mechanisms and define logging policies.
  7. Establish a Communication Plan: Define internal communication channels. Prepare notification templates for management, employees, customers, and regulatory authorities. Plan for media handling if a major breach occurs.
  8. Training and Awareness: Conduct regular employee security training. Perform incident response drills and tabletop simulations to test team readiness.
  9. Testing and Review: Perform tabletop exercises and penetration testing. Identify gaps in the existing plan and update it regularly.
  10. Plan Maintenance and Continuous Improvement: Review the plan after every incident. Update based on lessons learned. Adapt to new threats and evolving technologies.
Key Exam Point: A good IR plan is a living document β€” it must be continuously tested, updated, and improved. A plan that is never tested is as dangerous as having no plan.
Q8
Explain the Incident Response Technologies used in cybersecurity.
10 Marks
β–Ύ

Definition

Incident Response Technologies are specialized tools and systems used to detect, analyze, contain, and recover from cybersecurity incidents. They form the technical backbone of modern cybersecurity defense.

Key Technologies

TechnologyFull FormFunctionBest For
SIEMSecurity Information and Event ManagementCollects and correlates logs and security data from across systems. Helps teams spot real threats and reduce alert noise.Early threat detection and centralized analysis.
SOARSecurity Orchestration, Automation, and ResponseAutomates repetitive response tasks and integrates multiple security tools. Defines automated playbooks for known incident types.Reducing analyst workload, faster automated response.
EDREndpoint Detection and ResponseMonitors and protects individual devices against threats that bypass traditional antivirus. Collects endpoint telemetry and can quarantine infected systems.Device-level threat detection and isolation.
XDRExtended Detection and ResponseExpands detection across endpoints, networks, cloud, and other sources in a unified system. Detects complex multi-vector threat patterns.Unified visibility and cross-environment response.
UEBAUser and Entity Behavior AnalyticsUses machine learning to identify abnormal behavior by users or devices that may indicate insider threats or compromised accounts.Detecting insider threats and account compromise.
IDS/IPSIntrusion Detection/Prevention SystemsIDS monitors network traffic for suspicious patterns and generates alerts. IPS actively blocks suspicious traffic in real-time.Network-level threat monitoring and blocking.

Importance of These Technologies

  • Faster Detection: Helps catch threats before they spread widely across the network.
  • Automated Responses: Reduces manual analyst workload and speeds up mitigation actions through automation.
  • Better Coordination: Provides responders with contextual insights and unified views of attacks across the entire environment.
SIEM vs SOAR: SIEM collects and correlates data (detection focus). SOAR automates the response actions after detection. In modern environments, they work together β€” SIEM feeds alerts into SOAR for automated orchestrated response.
Q9
Explain the Incident Response Strategy and its essential elements for success.
10 Marks
β–Ύ

Definition

An Incident Response Strategy is a comprehensive, high-level plan that defines how an organization will detect, respond to, and recover from cybersecurity incidents using a structured, cyclical approach β€” minimizing damage and improving resilience over time.

Key Phases of an IR Strategy

  1. Preparation: Develop policies, identify critical assets, train the CSIRT, and set up tools for detection and analysis. This phase creates the foundation for all subsequent phases.
  2. Detection and Analysis: Continuously monitor systems to identify potential security incidents. Determine the incident's scope and severity. Classify the type of attack.
  3. Containment, Eradication, and Recovery: Isolate affected systems to prevent spread, eliminate the threat (malware/attacker presence), restore services safely from clean backups.
  4. Post-Incident Activity: Document everything, conduct a "lessons learned" review with all stakeholders, and update the strategy to improve future responses.

Essential Elements for a Successful IR Strategy

  1. Defined Roles: Clearly identify who is responsible for declaring an incident, managing communications, executing technical tasks, and legal obligations. Without defined roles, response becomes chaotic.
  2. Incident Playbooks: Specific, step-by-step instructions for common scenarios like ransomware attacks, phishing incidents, insider threats, or data breaches. Playbooks eliminate guesswork under pressure.
  3. Communication Plan: Establish secure, out-of-band communication channels for the IR team. Regular corporate email may be compromised during an incident. Include templates for notifying management, staff, customers, and regulators.
  4. Documentation: Keep a detailed incident log tracking all actions taken. This is critical for legal and forensic purposes, regulatory compliance reporting, and future improvement.
  5. Regular Training: Conduct tabletop exercises to simulate real incidents and test the plan. Ensures team members know their roles and can act confidently without referring to documentation every step.
Real-World Note: A key reason many organizations fail during incidents is the absence of out-of-band communication. If attackers control email servers, the incident team cannot coordinate β€” always have a secondary communication channel (Signal, encrypted chat, phone tree).
EXTRAExtra Topics

API Security Risks, Application Security Testing, Best Practices, CIR Overview, IR Essentials & 5 Stages, IR Planning, IR Technologies, IR Strategy, and a Case Study.

E1
What are API Security Risks? Explain the OWASP API Security Top 10.
10 Marks
β–Ύ

Definition

API Security refers to the practices and technologies used to protect Application Programming Interfaces (APIs) from attacks, misuse, and unauthorized access. APIs are the backbone of modern applications β€” a single breach can expose millions of users' data.
OWASP API Security Top 10 β€” 2023 Edition
OWASP API Security Top 10 2023

Image unavailable β€” see owasp.org/www-project-api-security

Source: OWASP API Security Project β€” owasp.org

OWASP API Security Top 10 β€” Explained

#RiskDescription & Example
API1Broken Object Level Auth (BOLA)APIs expose object IDs; attacker changes ID in request to access another user's data.
Ex: GET /orders/1001 β†’ change to /orders/1002 to see another user's order.
API2Broken AuthenticationWeak/missing auth mechanisms. No token expiry, no brute-force protection, weak JWT secrets.
Ex: Reusing expired session tokens to access protected endpoints.
API3Broken Object Property Level AuthAPI returns more data than needed (over-exposure) or allows mass assignment attacks.
Ex: PUT /user with extra field {"role":"admin"} is accepted without validation.
API4Unrestricted Resource ConsumptionNo rate limiting on API β€” attacker sends thousands of requests, causing DoS or high cloud costs.
Ex: SMS verification API spammed to charge the company per-message.
API5Broken Function Level AuthRegular users can access admin-only API functions by guessing endpoints.
Ex: POST /api/admin/delete accessible without admin role check.
API6Unrestricted Access to Sensitive FlowsAutomated bots abusing legitimate business flows (bulk buying, account takeovers).
API7Server-Side Request ForgeryAPI fetches URLs from user input without validation, accessing internal services.
API8Security MisconfigurationDefault credentials, CORS wildcard, verbose error messages, unnecessary HTTP methods enabled.
API9Improper Inventory ManagementOld/deprecated API versions still running with known vulnerabilities.
Ex: v1 of API still accessible with old vulnerable authentication logic.
API10Unsafe Consumption of APIsTrusting data from third-party APIs without validation, leading to injection or other attacks.
Prevention: Implement proper authorization on every endpoint, use API gateways for rate limiting, validate all inputs, version your APIs properly, and never expose more data than needed (apply the principle of least exposure).
E2
What is Application Security Testing? Explain its types in detail.
10 Marks
β–Ύ

Definition

Application Security Testing (AST) is the process of testing software applications to identify security vulnerabilities, weaknesses, and flaws before attackers can exploit them. It is a critical part of the Software Development Lifecycle (SDLC).
SAST vs DAST vs IAST vs RASP β€” Visual Comparison
SAST DAST IAST RASP Security Testing Types

Image unavailable offline. Refer to your textbook for the SAST/DAST/IAST diagram.

Source: GlobalDots β€” Application Security Testing Explained

Types of Application Security Testing

TypeFull FormHow It WorksPhaseFinds
SASTStatic Application Security Testing Analyzes source code, bytecode, or binaries without executing the application. Scans for patterns matching known vulnerabilities. Also called "white-box testing". Early β€” during development. Can be integrated into IDEs and CI/CD. SQL injection patterns, hardcoded credentials, buffer overflows, insecure function calls.
DASTDynamic Application Security Testing Tests the running application from the outside β€” simulates an attacker sending malformed inputs and analyzing responses. Also called "black-box testing". Testing/staging phase, on a running application. XSS, SQLi, authentication flaws, runtime issues, misconfigurations.
IASTInteractive Application Security Testing Combines SAST and DAST β€” uses agents/sensors deployed inside the running application to monitor it from within during testing. Provides real-time vulnerability data with very low false positives. QA and functional testing phase. Runtime issues + code-level context. Very accurate.
SCASoftware Composition Analysis Identifies open-source libraries and third-party components used in the application and checks them against known vulnerability databases (CVE/NVD). Continuous β€” all SDLC phases. Known CVEs in dependencies, license compliance issues.
Penetration TestingManual / Automated Security experts simulate real-world attacks on the application manually. More thorough and creative than automated tools β€” finds logic flaws and chained vulnerabilities. Pre-release, compliance audits, periodic security reviews. Business logic flaws, chained exploits, privilege escalation, complex auth bypasses.
RASPRuntime Application Self-Protection Security technology built directly into the application runtime. Detects and blocks attacks in real-time by intercepting application calls and comparing behavior to a security model. Production β€” acts as last line of defense. Zero-day exploits, injection attacks, unexpected file access patterns.

SAST vs DAST β€” Quick Comparison

AspectSAST (White-Box)DAST (Black-Box)
Code access needed?Yes β€” analyzes source codeNo β€” tests running app
PhaseEarly (development)Late (testing/staging)
False positivesHighLow
FindsCode-level flawsRuntime/network flaws
Exam Tip: The best strategy uses all types together β€” SAST early, SCA continuously, DAST/IAST in testing, Pen Testing before release, RASP in production. This is "Defense in Depth" for application security testing.
E3
What are Application Security Best Practices? Explain in detail.
10 Marks
β–Ύ

Definition

Application Security Best Practices are a set of proven guidelines, principles, and techniques that developers and security teams follow to build, maintain, and operate secure software applications throughout their lifecycle.

10 Key Best Practices

  1. Secure by Design (Shift-Left Security): Security must be considered from the very beginning of development, not as an afterthought. Conduct threat modeling during design. Follow the Security Development Lifecycle (SDL). Use STRIDE to identify threats early.
  2. Input Validation and Output Encoding: Never trust user-supplied input. Validate all inputs against expected type, length, format, and range. Encode output to prevent XSS. Use parameterized queries to prevent SQL injection.
  3. Strong Authentication and MFA: Enforce strong password policies. Implement Multi-Factor Authentication (MFA) for all critical systems. Use secure session management β€” generate new session IDs after login, set proper expiry, invalidate on logout.
  4. Principle of Least Privilege: Every user, process, and component should have the minimum permissions necessary to perform its function. Restricts the blast radius if an account is compromised. Apply to database users, API keys, service accounts, and cloud IAM roles.
  5. Encryption at Rest and in Transit: All sensitive data must be encrypted when stored (AES-256) and when transmitted (TLS 1.2+). Never use deprecated algorithms (MD5, SHA1, DES). Hash passwords with bcrypt, scrypt, or Argon2.
  6. Patch Management and Dependency Updates: Continuously monitor third-party libraries for known vulnerabilities (CVEs) using SCA tools. Apply security patches promptly. Maintain a Software Bill of Materials (SBOM). Remove unused/outdated dependencies.
  7. Regular Security Testing: Integrate SAST in CI/CD pipelines. Perform DAST on staging environments. Conduct periodic penetration tests. Run vulnerability assessments before major releases.
  8. Security Logging and Monitoring: Log all authentication events, API calls, errors, and administrative actions. Monitor logs in real-time using SIEM. Set up alerts for anomalous activity. Retain logs for compliance and forensic purposes.
  9. Secure Software Development Lifecycle (S-SDLC): Embed security checkpoints at every SDLC phase β€” requirements, design, implementation, testing, deployment, maintenance. Train all developers in secure coding practices. Conduct security code reviews.
  10. Error Handling and Information Disclosure Prevention: Never expose stack traces, database errors, or internal paths to end users. Use generic error messages for users. Log detailed errors securely server-side. Disable debug mode in production.
Key Takeaway: Application security is a continuous process integrated into every phase of development and operation. A secure application is built on secure design, validated inputs, strong authentication, least privilege, and continuous monitoring.
E4
Explain the Overview and Fundamentals of Cyber Incident Response (CIR).
10 Marks
β–Ύ

Definition

Cyber Incident Response (CIR) is a structured, systematic approach used by organizations to detect, manage, contain, and recover from cybersecurity incidents that threaten the confidentiality, integrity, or availability (CIA) of information systems.
Incident Response Lifecycle β€” Phases Overview
Incident Response Lifecycle Phases

Image unavailable offline β€” refer to NIST SP 800-61.

Source: Atlassian / NIST

Key Fundamentals of CIR

  1. Structured Approach: CIR follows a documented lifecycle recommended by NIST (SP 800-61). This ensures consistency, accountability, and measurability across all incident types.
  2. Scope of Incidents: Covers malware infections, ransomware attacks, phishing campaigns, data breaches, insider threats, DDoS attacks, unauthorized access, and supply chain attacks.
  3. Primary Goal: Minimize damage, reduce recovery time and costs, protect organizational reputation, maintain legal/regulatory compliance, and prevent recurrence.
  4. CIA Triad Protection: CIR exists to protect Confidentiality (data access only to authorized users), Integrity (data accuracy and trustworthiness), and Availability (systems accessible when needed).
  5. Key Principle β€” Don't Panic: CIR ensures organizations respond in a controlled, efficient, and legally compliant manner rather than reacting in panic. A tested IR plan reduces chaos during an actual incident.
  6. CSIRT: A dedicated Computer Security Incident Response Team with defined roles β€” Incident Manager, Security Analysts, Forensics Experts, Legal, PR β€” handles all aspects of response.
  7. Cyber Incident vs. Cyber Event: A security event is any observable occurrence (failed login). A security incident is an event that violates security policy or threatens the CIA triad (successful breach). CIR focuses on confirmed incidents.

Why CIR Matters

Reduces financial losses Protects reputation Regulatory compliance Minimizes downtime Improves future posture
Legal Context: Many regulations (GDPR, HIPAA, PCI-DSS) require organizations to have a documented incident response plan. Failure to respond appropriately to a breach can result in significant regulatory fines beyond the breach costs themselves.
E5
Explain the Essential Components and 5 Stages of Incident Response.
10 Marks
β–Ύ

Essential Components of IR (must exist BEFORE an incident)

ComponentDescription
IR PolicyFormal management-approved document defining authority, scope, and objectives of the IR program.
IR PlanHigh-level document detailing the overall approach, team structure, and communication channels.
IR Procedures / PlaybooksStep-by-step technical instructions for specific incident types (ransomware, phishing, data breach).
CSIRT / IR TeamDedicated team with defined roles β€” Incident Manager, Analysts, Legal, PR, IT Support.
Detection ToolsSIEM, IDS/IPS, EDR, UEBA for monitoring and detecting incidents.
Communication PlanOut-of-band channels for team coordination + templates for stakeholder notifications.
Training & DrillsRegular tabletop exercises and simulations to test readiness.

The 5 Stages of Incident Response

5 Stages of Incident Response β€” Infographic
5 Stages of Incident Response Lifecycle

Image unavailable offline.

Source: Zenduty β€” Incident Response Lifecycle
Stage 1
Preparation
Policies, training, SIEM/IDS tools, playbooks, CSIRT formation. This is the most critical stage β€” everything else depends on it.
Stage 2
Detection & Analysis
Detect suspicious activity, analyze alerts and logs, confirm true positive, determine scope and severity, classify incident type.
Stage 3
Containment
Short-term: isolate affected systems immediately. Long-term: disable compromised accounts, block IPs/domains. Preserve evidence for forensics.
Stage 4
Eradication
Remove malware, backdoors, unauthorized access. Patch exploited vulnerabilities. Reset all compromised credentials. Verify systems are completely clean.
Stage 5
Recovery & Lessons
Restore from verified clean backups. Monitor for re-infection. Document everything, conduct post-mortem, update IR plan, improve controls.
Key Exam Point: The 5 stages are cyclical β€” not linear. Lessons learned from Stage 5 continuously improve the Preparation in Stage 1. This cycle is fundamental to the NIST model.
E6
Explain how to build an Incident Response Strategy. What are its essential elements?
10 Marks
β–Ύ

Definition

An Incident Response Strategy is a high-level, comprehensive framework that defines how an organization prepares for, detects, responds to, and recovers from cybersecurity incidents β€” using a structured, cyclical approach that continuously improves over time to minimize damage and build long-term cyber resilience.

Building an IR Strategy β€” Key Steps

  1. Define Strategic Objectives: Define KPIs β€” Mean Time to Detect (MTTD), Mean Time to Respond (MTTR), Mean Time to Contain (MTTC). Set targets aligned with business risk appetite and regulatory requirements.
  2. Establish Governance and Sponsorship: Get executive buy-in. The IR strategy needs CISO and C-suite sponsorship for budget, authority, and cross-department cooperation.
  3. Build and Train the CSIRT: Assemble a cross-functional team. Provide technical training in digital forensics, malware analysis, and threat hunting. Run tabletop simulations quarterly.
  4. Define Incident Classification and Severity: Create a clear severity matrix (P1/Critical β†’ P4/Low). Define what actions each severity level triggers. P1 = all-hands response, P4 = monitor and log.
  5. Develop Threat-Specific Playbooks: Create playbooks for top threats β€” ransomware, phishing, data exfiltration, insider threat, DDoS, supply chain attack. Each includes detection criteria, containment steps, evidence collection, communication triggers, and recovery procedures.
  6. Integrate with Business Continuity: IR strategy must align with BCP (Business Continuity Plan) and DRP (Disaster Recovery Plan).

Essential Elements for Strategy Success

ElementWhy It Matters
Defined Roles & ResponsibilitiesWithout clear ownership, response is chaotic. Everyone must know exactly what to do on Day 1 of an incident.
Incident PlaybooksStep-by-step runbooks for specific threat types eliminate guesswork under pressure. Tested playbooks = faster response.
Secure Communication ChannelsCorporate email may be compromised during an incident. Out-of-band channels are essential for team coordination.
Comprehensive DocumentationEvery action taken must be logged with timestamps. Essential for forensics, legal proceedings, insurance claims, and regulatory reports.
Regular Training & DrillsA plan that is never tested is useless. Quarterly tabletop exercises and annual full-scale simulations ensure the team can execute under real pressure.
Threat Intelligence IntegrationContinuously feed current threat intelligence β€” new malware families, TTPs, zero-days. Strategy must evolve with the threat landscape.
Metrics to Track: MTTD (Mean Time to Detect), MTTR (Mean Time to Respond), and MTTC (Mean Time to Contain) are the key performance indicators of IR strategy effectiveness.
E7
Case Study: Explain a real-world cyber incident and how Incident Response was applied.
10 Marks
β–Ύ
Case Study 1 β€” Ransomware
WannaCry Ransomware Attack (May 2017)

Background

In May 2017, the WannaCry ransomware cryptoworm infected over 200,000 systems in 150 countries within 24 hours. It exploited the EternalBlue vulnerability in Microsoft Windows SMB protocol (CVE-2017-0144) β€” a patch (MS17-010) had been available for 2 months but many organizations had not applied it.

Impact

  • WannaCry spread automatically across networks β€” no user interaction needed (worm behavior).
  • Encrypted all files and demanded Bitcoin ransom ($300–$600 per machine).
  • UK NHS severely impacted β€” appointments cancelled, emergency diversions. TelefΓ³nica, Renault, FedEx, Deutsche Bahn also affected.
  • Estimated damages: over $4 billion globally.

How IR Phases Applied

IR PhaseWhat Happened / Lessons
Preparation (FAILED)Organizations that were hit had not applied MS17-010. No patch management process. Lesson: critical patches must be applied within 48–72 hours.
DetectionSIEM systems and endpoint alerts detected mass file encryption events. Reports flooded in within hours of outbreak beginning.
ContainmentMarcus Hutchins (MalwareTech) registered the kill-switch domain, halting new infections. Organizations isolated infected machines and blocked SMB port 445 at the firewall.
EradicationApplied MS17-010 patch to all remaining unpatched systems. Removed WannaCry from infected endpoints. Disabled SMBv1 protocol enterprise-wide.
RecoveryOrganizations with backups restored systems quickly. Those without backups lost data permanently or paid the ransom (not recommended).
Lessons LearnedMandate patching SLAs. Maintain offline backups. Disable legacy protocols (SMBv1). Segment networks to limit lateral movement.
Case Study 2 β€” Supply Chain Attack
SolarWinds Supply Chain Attack (2020)

Background

Attackers (attributed to Russian SVR intelligence) compromised the build system of SolarWinds and inserted a backdoor (SUNBURST) into a legitimate software update for the Orion platform, distributed to ~18,000 organizations including US government agencies and major corporations.

Key Facts

  • Attack vector: Compromised CI/CD pipeline β€” a software supply chain attack.
  • Dwell time: Attackers had access for 8–9 months before detection.
  • Detection: FireEye discovered the breach while investigating their own hack β€” noticed a new device registering with their VPN.

IR Application

IR PhaseApplication
PreparationMost organizations lacked supply chain security monitoring. Lesson: extend IR preparation to include vendor/third-party risk monitoring and SBOM tracking.
DetectionMissed by most SIEM rules because the attacker used legitimate, signed software. UEBA and anomaly detection were critical.
ContainmentImmediate disconnection of SolarWinds Orion. CISA issued emergency directive ordering all US federal agencies to power down affected versions.
EradicationRemove SUNBURST backdoor. Hunt for all lateral movement. Full credential resets across the enterprise.
Lessons LearnedZero Trust Architecture. Monitor outbound traffic for anomalous connections. Implement secure build pipelines with integrity checks. Conduct supply chain risk assessments of all major vendors.
Key Takeaway from Both Case Studies: Organizations that recovered fastest had (1) up-to-date backups, (2) network segmentation to limit spread, (3) pre-defined IR playbooks for the incident type, and (4) clear communication channels. Both breaches could have been significantly limited by better Preparation β€” the most important IR phase.
QUICKLast-Minute Reference

Key definitions, acronyms, and comparisons β€” review this 30 minutes before the exam.

A–Z
All Key Acronyms & Definitions
Quick Ref
β–Ύ
AcronymFull FormOne-Line Purpose
OWASPOpen Web Application Security ProjectOrganization that publishes the Top 10 application security risks.
SQLiSQL InjectionInserting malicious SQL to manipulate database queries.
XSSCross-Site ScriptingInjecting malicious scripts into web pages viewed by other users.
SSRFServer-Side Request ForgeryForcing server to make requests to internal/unintended systems.
NISTNational Institute of Standards and TechnologyUS body that defines cybersecurity frameworks and IR guidelines.
CIRCyber Incident ResponseStructured approach to detect, manage, and recover from incidents.
CSIRTComputer Security Incident Response TeamThe dedicated team that handles cybersecurity incidents.
SIEMSecurity Information and Event ManagementCentralized log collection, correlation, and threat detection.
SOARSecurity Orchestration, Automation, and ResponseAutomates IR workflows and integrates security tools.
EDREndpoint Detection and ResponseMonitors and responds to threats on individual devices.
XDRExtended Detection and ResponseUnified detection across endpoints, networks, and cloud.
UEBAUser and Entity Behavior AnalyticsML-based detection of abnormal user/device behavior.
IDS/IPSIntrusion Detection/Prevention SystemsIDS alerts; IPS actively blocks suspicious traffic.
SASTStatic Application Security TestingAnalyzes source code for vulnerabilities without running the app.
DASTDynamic Application Security TestingTests running application from outside like an attacker.
IASTInteractive Application Security TestingAgent inside running app β€” combines SAST+DAST benefits.
SCASoftware Composition AnalysisChecks open-source dependencies for known CVEs.
RASPRuntime Application Self-ProtectionSecurity built into app runtime to block attacks in production.
DDoSDistributed Denial of ServiceFlood attack from multiple sources to bring down services.
IDORInsecure Direct Object ReferenceAccessing another user's data by manipulating object IDs.
MFAMulti-Factor AuthenticationTwo or more verification factors required to authenticate.
MTTDMean Time to DetectAverage time to discover a security incident.
MTTRMean Time to RespondAverage time to take action after detection.
SBOMSoftware Bill of MaterialsInventory of all software components in an application.
BOLABroken Object Level AuthorizationAPI1 β€” attacker accesses other users' data by changing IDs.
β˜…
OWASP Top 10 β€” Memory Aid (In Order)
Quick Ref
β–Ύ

Memorize these in order β€” they're likely to appear in list-type questions.

  1. Broken Access Control β€” Users accessing what they shouldn't
  2. Cryptographic Failures β€” Weak encryption / plain-text sensitive data
  3. Injection β€” SQL, NoSQL, OS command injection
  4. Insecure Design β€” Architectural flaws, no threat modeling
  5. Security Misconfiguration β€” Default creds, open cloud storage
  6. Vulnerable & Outdated Components β€” Unpatched libraries
  7. Identification & Authentication Failures β€” Weak passwords, no MFA
  8. Software & Data Integrity Failures β€” Insecure CI/CD, bad updates
  9. Security Logging & Monitoring Failures β€” No alerts, no audit logs
  10. Server-Side Request Forgery (SSRF) β€” Server fetches attacker-controlled URLs
IR
IR Phases Summary β€” NIST Model
Quick Ref
β–Ύ
1. Preparation 2. Identification 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned
PhaseKey ActionsTiming
PreparationPolicies, training, tools deployment, playbooksBefore incident
IdentificationDetect, analyze, confirm, determine scopeDuring / onset
ContainmentIsolate systems, disable accounts, block IPsImmediately after detection
EradicationRemove malware, patch vulns, close gapsAfter containment
RecoveryRestore from backups, verify, monitorAfter eradication
Lessons LearnedPost-mortem, update plan, improve controlsAfter recovery