Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The tasks for the assignment are described in the following.Figure 1 : Vehicle / Hardware overview Task 1 - Identify the main assets ( the

The tasks for the assignment are described in the following.Figure 1: Vehicle/Hardware overview
Task 1- Identify the main assets (the targets of the attacker) of the system.
Task 2- Identify the entry points of the system; that is the points that the attacker can use to inject data into the system and may modify its behavior.
Task 3- Use abuse case threat modeling method to identify 3 to 5 abuse cases to ApolloAuto and relate the threats to the entry points that you identified in Task 1.2.
Task 4- Use the STRIDE threat modeling method to identify 3 to 5 major reasonable attack goals and relate them to the entry points that you identified in Task 1.2. Next, develop an attack tree for each of the identified attack goals.
Task 5- Reflect on the lessons that you learned from the exercise in about two paragraphs.
You may visit Section 3.3 of this documentLinks to an external site. to see examples of to Credit card.
You should submit a report that describes your work on each of the tasks.
Task 6-- Give constructive feedback to the assigned submission. The comments should discuss the strengths and weaknesses of the work and should include improvement suggestions. The reviews must be submitted as a comment to the assigned submission. You do not need to submit an answer to Task 6 in your report.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Driven Web Sites

Authors: Joline Morrison, Mike Morrison

2nd Edition

? 061906448X, 978-0619064488

More Books

Students also viewed these Databases questions

Question

What are the Five Phases of SDLC? Explain each briefly.

Answered: 1 week ago

Question

How can Change Control Procedures manage Project Creep?

Answered: 1 week ago