Question: Create an attack tree for reading someone else's email. Assign a difficulty level to each attack node ( e . g . , easy, hard,
Create an attack tree for reading someone else's email. Assign a difficulty level to each attack node eg "easy," "hard," "very hard" Which attack requires the least sophistication on the part of the attacker? Which attack requires the greatest expertise? What types of attackers do you think would use either attack?
Important: minimum requirement for each attack tree:
Has at least three different attacks secondlevel nodes
Has at least one attack with a path at least three subnodes deep
Has at least two attacks that have subtasks with at least two immediate children
Answers all questions and justifies rankings and answers. EgWe think that attack would be the easiest because whereas would not be as easy because
We think that tailgating behind a legitimate member would be the easiest attack because it requires minimal effort and resources, simply relying on exploiting the physical security vulnerabilities of the gyms entrance. Whereas, manipulating the receptionist by creating a distraction would not be as easy because it involves orchestrating a complex scenario, potentially requiring the involvement of multiple actors and careful planning to divert the receptionist's attention effectively.
This will let you easily create something like this:
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
