Attack Tree: Networking

Attack Tree: Networking

Edith Cowan College Australia

Information:

This assignment will assess your understanding of attack

tree methodology, your skills in the analysis of a concept

and your research ability into identifying methods by

which to compromise a specific entity.

A manager at an accounting firm has recently discovered

that a number of employees use various online social

networking services. In the interest of the employees you

have been hired by this firm to educate the employees on

ways in which their Facebook or Twitter account could be

compromised. The employees have basic to intermediate

computer skills. In addition, they are quite naive

regarding the security risks of using the Internet. A small

internal survey discovered that the majority of employees

do not use a personal firewall or anti-virus software on

their Windows 10 operating system. In addition, they all

use a Gmail email accounts to access Facebook or

Twitter. Thus you can assume that overall ideal cyber

security practices are not followed.

Task:

Using the background information draw a set of attack

trees that reflect your analysis of how you could

successfully compromise a Facebook or Twitter account.

In the context of this assignment, ‘compromise’ refers to

process of obtaining the user’s authentication credentials,

obtaining the data within these online services, possessing

the ability to misuse these online services for your own

personal gain, or simply spying on the private content

within these accounts. The manager is interested in all

ways in which the account could be compromised.

The submission must be a Microsoft Word document. The

diagrams may be produced using any software product

but must be converted and inserted into the Microsoft

Word document. All diagrams and text must be

incorporated into one document. Assignments that are not

in the specified format will not be marked. To

demonstrate your research ability you must adequately

reference each of the attack methods you have identified.

It is recommended that you place the ‘in-text’ reference

within each node of the attack tree.

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"