Professional Documents
Culture Documents
Week 7 Tutorial
Week 7 Tutorial
Task 1.
Boundary Protection.
In groups work through this network diagram, discuss which measures to put in place and
provide a brief rationale for each measure. (Approach this from an illative design, showing
the evolution of the network design)
Task 3.
Consider further mitigation of the risks you have identified within your Attack Trees.
Consider kill chain. (Sans – ICS Kill Chain white paper)
Example of attack event. Read w32 Stuxnet dossier