Evaluate the concept of the defence-in-depth approach to cyber-defence.Outline the steps needed to secure a computer system and/or give recommendations for cyber-defence

In order to pass Assessment 1, you will need to:

• Apply your knowledge of information security to a given real-world problem

• Evaluate the concept of the defence-in-depth approach to cyber-defence

• Outline the threat vector given an information security scenario

• Outline the steps needed to secure a computer system and/or give recommendations for cyber-defence

• Justify the choices and selections of information security tools and techniques included in your solution to a given scenario