The goal of this exercise is use hypothesis testing to explore and identify vulnerabilities in the following standards:
Attention should be paid to the following security models to aid in your hypothesis testing
-
The CIA Model
- Confidentiality
- Integrity
- Availability
-
The DDPRR Model
- Detect
- Deter
- Protect
- React
- Recover
For further information and questions please contact Dr Andrew Blyth, PhD. ablyth@merimetso.net