Information

Edith Cowan College Australia
Information:
This assignment will assess your understanding of attack
tree methodology, your skills in the analysis of a concept
and your research ability into identifying methods by
which to compromise a specific entity.
A manager at an accounting firm has recently discovered
that a number of employees use various online social
networking services. In the interest of the employees you
have been hired by this firm to educate the employees on
ways in which their Facebook or Twitter account could be
compromised. The employees have basic to intermediate
computer skills. In addition, they are quite naive
regarding the security risks of using the Internet. A small
internal survey discovered that the majority of employees
do not use a personal firewall or anti-virus software on
their Windows 10 operating system. In addition, they all
use a Gmail email accounts to access Facebook or
Twitter. Thus you can assume that overall ideal cyber
security practices are not followed.
Task:
Using the background information draw a set of attack
trees that reflect your analysis of how you could
successfully compromise a Facebook or Twitter account.
In the context of this assignment, ‘compromise’ refers to
process of obtaining the user’s authentication credentials,
obtaining the data within these online services, possessing
the ability to misuse these online services for your own
personal gain, or simply spying on the private content
within these accounts. The manager is interested in all
ways in which the account could be compromised.
The submission must be a Microsoft Word document. The
diagrams may be produced using any software product
but must be converted and inserted into the Microsoft
Word document. All diagrams and text must be
incorporated into one document. Assignments that are not
in the specified format will not be marked. To
demonstrate your research ability you must adequately
reference each of the attack methods you have identified.
It is recommended that you place the ‘in-text’ reference
within each node of the attack tree.

Solution:

15% off for this assignment.

Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!

Why US?

100% Confidentiality

Information about customers is confidential and never disclosed to third parties.

Timely Delivery

No missed deadlines – 97% of assignments are completed in time.

Original Writing

We complete all papers from scratch. You can get a plagiarism report.

Money Back

If you are convinced that our writer has not followed your requirements, feel free to ask for a refund.