Attack Tree: Networking

EdithCowan College Australia

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Information:

This assignment will assess your understanding of attack

tree methodology, your skills in the analysis of a concept

and your research ability into identifying methods by

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

which to compromise a specific entity.

A manager at an accounting firm has recently discovered

that a number of employees use various online social

networking services. In the interest of the employees you

have been hired by this firm to educate the employees on

ways in which their Facebook or Twitter account could be

compromised. The employees have basic to intermediate

computer skills. In addition, they are quite naive

regarding the security risks of using the Internet. A small

internal survey discovered that the majority of employees

do not use a personal firewall or anti-virus software on

their Windows 10 operating system. In addition, they all

use a Gmail email accounts to access Facebook or

Twitter. Thus you can assume that overall ideal cyber

security practices are not followed.

Task:

Using the background information draw a set of attack

trees that reflect your analysis of how you could

successfully compromise a Facebook or Twitter account.

In the context of this assignment, ‘compromise’ refers to

process of obtaining the user’s authentication credentials,

obtaining the data within these online services, possessing

the ability to misuse these online services for your own

personal gain, or simply spying on the private content

within these accounts. The manager is interested in all

ways in which the account could be compromised.

The submission must be a Microsoft Word document. The

diagrams may be produced using any software product

but must be converted and inserted into the Microsoft

Word document. All diagrams and text must be

incorporated into one document. Assignments that are not

in the specified format will not be marked. To

demonstrate your research ability you must adequately

reference each of the attack methods you have identified.

It is recommended that you place the ‘in-text’ reference

within each node of the attack tree.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP