Approved-online-essay-writers

Attack Tree: Networking

Attack Tree: Networking

We Write Essays for Students

Tell us about your assignment and we will find the best writer for your paper

Get Help Now!

Edith Cowan College Australia

Information:

This assignment will assess your understanding of attack

tree methodology, your skills in the analysis of a concept

and your research ability into identifying methods by

which to compromise a specific entity.

A manager at an accounting firm has recently discovered

that a number of employees use various online social

networking services. In the interest of the employees you

have been hired by this firm to educate the employees on

ways in which their Facebook or Twitter account could be

compromised. The employees have basic to intermediate

computer skills. In addition, they are quite naive

regarding the security risks of using the Internet. A small

internal survey discovered that the majority of employees

do not use a personal firewall or anti-virus software on

their Windows 10 operating system. In addition, they all

use a Gmail email accounts to access Facebook or

Twitter. Thus you can assume that overall ideal cyber

security practices are not followed.

Task:

Using the background information draw a set of attack

trees that reflect your analysis of how you could

successfully compromise a Facebook or Twitter account.

In the context of this assignment, ‘compromise’ refers to

process of obtaining the user’s authentication credentials,

obtaining the data within these online services, possessing

the ability to misuse these online services for your own

personal gain, or simply spying on the private content

within these accounts. The manager is interested in all

ways in which the account could be compromised.

The submission must be a Microsoft Word document. The

diagrams may be produced using any software product

but must be converted and inserted into the Microsoft

Word document. All diagrams and text must be

incorporated into one document. Assignments that are not

in the specified format will not be marked. To

demonstrate your research ability you must adequately

reference each of the attack methods you have identified.

It is recommended that you place the ‘in-text’ reference

within each node of the attack tree.

The post Attack Tree: Networking appeared first on superioressaypapers.

Welcome to originalessaywriters.com, our friendly and experienced essay writers are available 24/7 to complete all your assignments. We offer high-quality academic essays written from scratch to guarantee top grades to all students. All our papers are 100% plagiarism-free and come with a plagiarism report, upon request

Tell Us “Write My Essay for Me” and Relax! You will get an original essay well before your submission deadline.

PLACE YOUR ORDER