Question: (a) Draw an attack tree that starts with the root node: Get password for e-mail account. Include at least 3 subtrees below the root node:
(a) Draw an attack tree that starts with the root node: Get password for e-mail account. Include at least 3 subtrees below the root node: One for attacks based on social engineering; one for physical attacks, and one for technical (software or hardware) attacks. The subtree for social engineering attacks must include at least 3 subtrees, while the other two subtrees must contain at least 2 subtrees each. Provide sufficient detail so that all leaf nodes are at least 3 nodes below the root node. Be sure to mark the logical and-branches in your attack tree and include at least one and-branch along with the more common logical or-branches.
(b) How many different attacks are covered by your attack tree? Explain how you determined this total. (c) Now annotate only the leaf nodes of your attack tree with either SE (Special Equipment required) or NSE (No Special Equipment required), as appropriate. (d) Lastly, determine the total number of attacks that do not require special equipment, based on your annotated attack tree. Explain how you determined this total.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
