Assignment 2 20% 1. A company called XYZ Inc. has recently migrated its entire infrastructure to the cloud. However, they did not put enough emphasis on network security and have become a target for a cyber attack. The attackers were able to penetrate the company's network and access sensitive information, including customer data and financial information. a) How did the attackers gain access to the network? 5M b) Draw an attack tree threat modelling. 10M c) What was the impact of the attack on XYZ Inc.? 5M d) How can XYZ Inc. prevent similar attacks in the future?5M (25 Marks) 2. Scenario: A company's network is attacked by a hacker who gains access to sensitive information. a) How did the hacker gain access to the network? 5M b) What type of information was compromised in the attack? 5M c) How long did the hacker have access to the network? 5M d) What impact did the attack have on the company? 5M e) What measures can the company take to prevent future attacks? 5M (25 Marks) 3. a) Draw a web application security architecture. 12M b) How to countermeasure web security attacks? 8M (20 Marks).