Chapter 21 ยท Part E ยท Exam Night

Exam Night Summary Brain Primer

Read this once the night before, once on the morning of, once in the 5 minutes before reading time. The whole course in a primer card.
You know more than you think. Read through this once, slowly. Don't try to learn anything new โ€” just remind yourself what you already know. Then close the laptop, eat dinner, sleep properly. Tired brain on exam day costs more marks than one extra hour of revision adds.

21.1 The Three Frameworks Everything Else Hangs Off

CIA Triad โ€” what's being protected

Pillar"Keep..."Attacked byDefended by
Confidentialitysecrets secretsniffing, breach, MITM, phishing, insiderencryption (TLS), access control, least privilege
Integritydata untamperedMITM, malware, SQLi, spoofinghashing, digital signatures, input validation
Availabilitysystems usableDDoS, ransomware, hardware failurebackups, redundancy, DDoS mitigation

AAA โ€” how access is controlled

Risk = Likelihood ร— Impact

Every security control either reduces likelihood (MFA, training, patching, firewalls) or reduces impact (segmentation, backups, least privilege, encryption at rest). Good design uses both.

21.2 The Layered Models

OSI 7 Layers (top โ†’ bottom)

  1. Application โ€” HTTP, DNS, SMTP, what users see
  2. Presentation โ€” encoding, encryption (TLS sits around here)
  3. Session โ€” managing connections
  4. Transport โ€” TCP (reliable) / UDP (fast); ports
  5. Network โ€” IP addressing, routing
  6. Data Link โ€” MAC addresses, switches, Wi-Fi frames
  7. Physical โ€” cables, radio waves

Memory: "All People Seem To Need Data Processing" (top to bottom).

TCP/IP 4 Layers (the practical version)

TCP/IPMaps to OSI
ApplicationApplication + Presentation + Session
TransportTransport
InternetNetwork
Network AccessData Link + Physical

21.3 Ports You Should Know Cold

PortProtocolEncrypted?
20/21FTPNo
22SSH / SFTPYes
25SMTPOften (STARTTLS)
53DNSNo (DoH/DoT encrypt)
67/68DHCPNo
80HTTPNo
110POP3No
143IMAPNo
443HTTPSYes (TLS)
3389RDPYes

21.4 IP & Subnetting Quick Reference

CIDRMaskHosts
/24255.255.255.0254
/25255.255.255.128126
/26255.255.255.19262
/27255.255.255.22430
/28255.255.255.24014
/30255.255.255.2522

21.5 Attacks โ†’ CIA โ†’ Defences (Cheat Card)

AttackFamilyCIAPrimary defence
PhishingSocialCMFA, training, email filtering, DMARC
RansomwareMalwareA (and increasingly C)Backups (offline), EDR, segmentation
MITMNetworkC, IHTTPS/TLS, VPN, certificate pinning
DDoSNetworkAScrubbing services (Cloudflare), rate limiting
SQL InjectionWebC, IParameterised queries, WAF, input validation
Spoofing (email)NetworkISPF + DKIM + DMARC
Brute forceAuthenticationCMFA, account lockout, rate limit
Insider abusePeopleC, ILeast privilege, monitoring, offboarding
Zero-dayVariousAnyDefence in depth, EDR, monitoring

21.6 Australian Legal Framework โ€” Names to Drop

21.7 ACSC Essential Eight โ€” Memory List

  1. Application control
  2. Patch applications
  3. Configure macro settings
  4. User application hardening
  5. Restrict admin privileges
  6. Patch operating systems
  7. Multi-factor authentication
  8. Regular backups

Memory hook: "App-Patch-Macro-Hardening, Admin-OS-MFA-Backup." Drop "ACSC Essential Eight" in any defence answer for free credibility.

21.8 Cryptography Quick Recall

21.9 Two Memorable Australian Breach Examples

Mention either when discussing breach response, NDB scheme, or insider/credential-related risks. Both are exam-credible Australian references.

21.10 Mark-Scoring Mental Habits

21.11 The Big Insights to Carry Into the Exam

Five things examiners reward:
1. Frameworks first. Always show CIA / AAA / risk thinking before content.
2. Specific over generic. Name technologies, attacks, laws, and breaches.
3. Tied controls. Each control should explicitly address an identified threat.
4. Australian context. Privacy Act, NDB, OAIC, ACSC, Essential Eight.
5. Defence in depth. Layers, not single solutions; trade-offs acknowledged.

21.12 What To Do Right Now

  1. Close this guide.
  2. Get dinner โ€” actual food, not snacks.
  3. Pack your bag for tomorrow: ID, pens, water, wristwatch (if allowed), tissues, calculator if permitted. Lay out clothes.
  4. Set TWO alarms.
  5. Sleep at least 7 hours. Yes, really. Tired brain costs more marks than late revision adds.
  6. In the morning: light breakfast (carbs + protein), arrive 20 minutes early, deep breaths, pen ready.
  7. During reading time: skim everything once; mark easy questions; mentally allocate time.
  8. Start with what you're strongest at to bank early marks and confidence.
  9. Use the templates. Use the vocabulary. Cite the Australian frameworks.
  10. If you blank on a question โ€” write the command-word response, tag CIA, name one control. Move on. Come back if time permits. Something always beats nothing.

21.13 Final Thought

You've covered 21 chapters, three frameworks, dozens of attacks and defences, the Australian legal landscape, and the practical tools of the trade. You know more than you think. The exam is just an opportunity to demonstrate it.

Trust the preparation. Stay calm under pressure. Take it one question at a time.

Good luck. You've got this. ๐ŸŽ“

โ† Previous
20. Practice Questions