Question
please I need you to make an attack tree and your attacker profile for each threat. Threat #1 Unauthorized Access - This is the most
please I need you to make an attack tree and your attacker profile for each threat.
Threat #1 Unauthorized Access - This is the most harmful threat as it leads to the loss of significant information and also to further attacks which could be worse than this. An attacker unknowingly gains access to your authorized section and steals sensitive resources. Suppose a host also playing the role of a web server has to provide web pages as per the request. But the host should not allow anybody to access the command shell without being sure about the identity of the user.
Security Solutions
Enforce strong authentication strategies. Keeping usernames and passwords secret from the unreliable sources. Not providing unnecessary access to any user or even to any employee.
Threat #2 Eavesdropping - Another greatest security threat in network. During eavesdropping, an intruder intercepts the packages of data transferred over HTTP (through monitoring software), modifies the data and misuses them in order to harm the network. It is really a dangerous threat as there are many tools named as Sniffers available and developed frequently to intercept the data packages.
Security Solutions
Entertaining encryption strategy will secure you a way out from eavesdropping. Using encryption measures like digital certificates (SSL certificates) will definitely lessen the risk of eavesdropping attacks. Apply network segmentation which will prevent eavesdropping as well as other network attacks. Employing Network Access Control enhances the security of your network by checking the authenticity of every device before establishing any connection.
Threat #3 Man-in-the-middle-attack - MITM is one of the most dreadful network threats. An intruder here establishes an independent connection with both sender and receiver, intercepts their messages one by one, modifies those messages and relays back to the sender and receiver. This all occurs so smoothly that both the sender and receiver never come to know that they are being overheard by someone. In addition it exposes your network to several other threats.
Security Solutions
Using Public Key Infrastructures based authentications. It not only protects the applications from eavesdropping and other attacks but also validates the applications as a trusted one. Both the ends are authenticated hence preventing (MITM) Man-in-the-middle-attack. Setting up passwords and other high level secret keys in order to strengthen the mutual authentication. Time testing techniques such as Latency examination with long cryptographic hash functions confirming the time taken in receiving a message by both the ends. Suppose if the time taken by a message to be delivered at one end is 20 seconds and if the total time taken exceeds up to 60 seconds then it proves the existence of an attacker.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started