BlogAttack Trees Computer Science Assignment Help

May 29, 2022by Dennis kimotho0

Hits: 0

Attack Trees Computer Science Assignment

https://learning.oreilly.com/library/view/threat-modeling-designing/9781118810057/9781118810057c04.xhtml#c04_level1_1

Attack Libraries (CAPEC and OWASP Top Ten attack libraries):

https://learning.oreilly.com/library/view/threat-modeling-designing/9781118810057/9781118810057c05.xhtml

Attack trees are an essential method for threat assessment. It evaluates the security of a system from an attacker perspective. The root node represents the attacks’ goal, and the remaining leaves indicate sub-goals or attack methods.

In this homework, you are expected to provide an attack tree for the system you threat-modeled in the lab. The goal of the attacks is to steal information from the password-protected blog website.

Question 1 Attack

Provide a report that includes your analysis. The report should consist of (but not limited to) the following items:

  1. Initial attack interfaces and a short description of why they can be the starting point for attacks
  2. Attack tree Attack Trees Computer Science Assignment
    1. Sub-goals
    2. The nodes of the tree (Please use AND, OR functions appropriately)

Question 2

Map the sub-goals and attack methods with the attack libraries given in the second reading

Attack Trees Computer Science Assignment Help

 

https://learning.oreilly.com/library/view/threat-modeling-designing/9781118810057/9781118810057c04.xhtml#c04_level1_1

Attack Libraries (CAPEC and OWASP Top Ten attack libraries):

https://learning.oreilly.com/library/view/threat-modeling-designing/9781118810057/9781118810057c05.xhtml

Attack trees are an essential method for threat assessment. It evaluates the security of a system from an attacker perspective. The root node represents the attacks’ goal, and the remaining leaves indicate sub-goals or attack methods.

In this homework, you are expected to provide an attack tree for the system you threat-modeled in the lab. The goal of the attacks is to steal information from the password-protected blog website.

Question 1 Attack Trees Computer Science Assignment Help

Provide a report that includes your analysis. The report should consist of (but not limited to) the following items:

  1. Initial attack interfaces and a short description of why they can be the starting point for attacks
  2. Attack tree
    1. Sub-goals
    2. The nodes of the tree (Please use AND, OR functions appropriately)

Question 2

Map the sub-goals and attack methods with the attack libraries given in the second reading

 

For Attack Trees Computer Science Assignment Help please click here

 

Leave a Reply

Your email address will not be published. Required fields are marked *