subject

How to design the attack tree for this question? Suppose the previous version of the joinMeSummer website does not require the user login and only provides an embedded form for the user to submit their information such as the parent’s name, address, phone number, email address, the kids’ name, grade level, birthday, allergy info, insurance number, as well as credit card information to pay. After the parent successfully registered their kids for any summer camp week and paid the fee, a confirmation email will be sent to the parent’s email address. The website does use https to provide security. What are possible threats? Suppose an attacker wants to get the personal information about these kids and their family (e. g. phone number, address), draw an attack tree using this as the root node with at least 3 subnodes and two more levels.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 11:00
Describe three characteristics of at-risk drivers. a. b. c. describe three characteristics of safe drivers. a. b. c. describe three driver errors that could cause a collision. a. b. c. how will this information affect you as a driver now and in the future? (2-3 sentences)
Answers: 2
question
Computers and Technology, 24.06.2019 17:00
What are some examples of what can be changed through options available in the font dialog box? check all that apply. font family italicizing bolding pasting drop shadow cutting character spacing special symbols
Answers: 2
question
Computers and Technology, 24.06.2019 18:00
Your computer running windows 10 is doing some very strange things with the operating system. you are fairly certain it is not a hardware issue. you need to try to get further insight into what is going on within the operating system. which tool would be best-suited for this?
Answers: 1
question
Computers and Technology, 25.06.2019 04:30
What is the purpose of network permissions? a)to control access to network resources b)to convert to wireless networking c)to enable the installation of nics d)to reduce operating costs
Answers: 1
You know the right answer?
How to design the attack tree for this question? Suppose the previous version of the joinMeSummer...
Questions
question
History, 03.05.2021 04:30
question
Mathematics, 03.05.2021 04:40