Question: (A) Draw an attack tree that starts with the root node: get password for email account. Include at least 3 subtrees below the root node:

(A) Draw an attack tree that starts with the root node: get password for email account. Include at least 3 subtrees below the root node: one for attacks based on social engineering, one for physical attacks and one for technical (hardware and software) attacks. The subtree for social engineering attacks must include at least three subtrees, while the other two subtrees must contain at least two subtrees each. Provide sufficient detail so that all leaf nodes are at least three nodes below the root node. Be sure to mark the logical and-branches in your attack tree and include at least one and-branch along with the more common logical or-branches. (B) How many different attacks are covered by your attack tree? Explain how you determined this total. (C) Now annotate only the leaf nodes of your attack tree with either SE (Special Equipment required) or NSE (No Special Equipment required), as appropriate. (D) Lastly, determine the total number of attacks that do not require special equipment, based on your annotated attack tree. Explain how you determined this total.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!