Develop an attack tree (Section 1.5.2) for obtaining a meal in the Student Center food court without your account being charged. Remember that an attack tree is more useful the more paths it shows to get to the goal; yours should have at least three branches (i.e., high-level approaches) under the root. Given below is Section 1.5.2.
Develop an attack tree (Section 1.5.2) for obtaining a meal in the Student Center food court without your account being charged. Remember that an attack tree is more useful the more paths it shows to get to the goal; yours should have at least three branches (i.e., high-level approaches) under the root. Given below is Section 1.5.2.
1.5.2 Attack trees for threat modeling Attack trees are another useful threat modeling tool, especially to identify attack vectors. A tree starts with a root node at the top, labeled with an overall attack goal (e.g., enter a house). Lower nodes break out alternative ways to reach their parent’s goal (e.g., enter through a window, through a door, tunnel into the basement). Each may similarly be broken down further (e.g., open an unlocked window, break a locked window). Each internal node is the root of a subtree whose children specify ways of reaching it. Subtrees end in leaf nodes. A path connecting a leaf node to the root lists the steps (attack vector) composing one full attack; intermediate nodes may detail prerequisite steps, or classify 14 Chapter 1. Security Concepts and Principles Ch.1. A'ack tree. tree root by window enter house leaf nodes a'ack goal by door by tunnel a'ack vector or or li; sash use glass cu'er with suc
Step by step
Solved in 2 steps with 1 images