FINAL PAPER 2026 FULL QUESTIONS
WITH CORRECT ANSWERS GRADED A+
⩥ Importance of secure software design. Answer: Designing for security
from the start helps reduce risks, prevents data breaches, and ensures
software is resilient against threats throughout its lifecycle.
⩥ Benefits of secure software development. Answer: Secure software
protects user data, maintains system integrity, builds user trust, and
reduces the cost and damage of post-deployment vulnerabilities.
⩥ Data protection in secure software. Answer: By using encryption,
access controls, input validation, and secure data storage, secure
software prevents unauthorized access or exposure of sensitive
information.
⩥ Reduction of cyber attacks and vulnerabilities. Answer: It implements
defensive coding practices, follows security standards (e.g., OWASP),
uses threat modelling, and conducts regular security testing to detect and
address issues early.
⩥ Design principles supporting secure software architecture. Answer:
Principles include least privilege, defense in depth, secure defaults, input
, validation, authentication/authorization, and secure communication
channels (e.g., HTTPS).
⩥ Requirements definition. Answer: This step involves gathering and
defining what the software must do, focusing on functionality, user
needs, and security requirements such as data protection and access
control.
⩥ Determining specifications. Answer: Specifications translate
requirements into detailed technical descriptions, outlining security
features like encryption, user authentication, and secure communication
protocols.
⩥ Design phase. Answer: In this phase, developers plan the software
architecture, including secure coding patterns, data flow diagrams, and
threat modelling to identify and mitigate potential vulnerabilities.
⩥ Secure development. Answer: During development, code is written
following secure coding standards (e.g., OWASP), using validated
libraries, input sanitisation, and secure authentication practices.
⩥ Integration. Answer: Integration combines various modules or
components into a complete system, ensuring they work together
securely and follow defined interfaces without exposing vulnerabilities.