Attack Trees:

https://learning.oreilly.com/library/view/threat-modeling-designing/9781118810057/9781118810057c04.xhtml#c04_level1_1

Attack Libraries (CAPEC and OWASP Top Ten attack libraries):

https://learning.oreilly.com/library/view/threat-modeling-designing/9781118810057/9781118810057c05.xhtml

Attack trees are an essential method for threat assessment. It evaluates the security of a system from an attacker perspective. The root node represents the attacks’ goal, and the remaining leaves indicate sub-goals or attack methods.

In this homework, you are expected to provide an attack tree for the system you threat-modeled in the lab. The goal of the attacks is to steal information from the password-protected blog website.

Question 1

Provide a report that includes your analysis. The report should consist of (but not limited to) the following items:

1. Initial attack interfaces and a short description of why they can be the starting point for attacks

2. Attack tree

a. Sub-goals

b. The nodes of the tree (Please use AND, OR functions appropriately)

Question 2

Map the sub-goals and attack methods with the attack libraries given in the second reading

Order your essay today and save 10% with the discount code ESSAYHELP