Question: 3 Regular Expressions ( II ) a ) Let L be the language given by L = { w i n { a , b
Regular Expressions II
a Let be the language given by
or and every is preceded andor followed by a :
Give a regular expression for the language and explain your answer.
b Here is a very practical application of what we've learned so far. In this exercise you will
have to model the language describing the step of a type of cyberattacks. No knowledge in
cybersecurity are required for this exercise.
For this exercise we define the actions that an attacker can do:
use Phishing to get access to a system
use a Bug to get access to a system
Increase control over the system
Extract information from a system
In order to start a cyberattack, an attacker needs to start by getting access to a system. To
do so they need to use Phishing or use a Bug Once the attacker is in the system,
they can Increase their control as much as they want to However, to get meaningful
information they need to Increase it at least one time. Once they have increased their
control, they can Extract information They can do this as many times as they like, but
if they do this more than twice, their attack will be discovered. To Extract more information
without being discovered they must restart their attack, or attack another system.
Your task is to give a regular expression over the alphabet I, describing
all possible attacks that an attacker can do without being discovered and explain
your answer. Don't forget that, after each attack, an attacker can restart their
attack, or switch to attacking another system.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
