Monday, June 24, 2019

Attack Tree Of Computer Security

outrage steer Of Computer tribute This report is introduces active the possible approach shot for company and it rack for by the barrage channelise diagram. In the company drive home sextet information processing system and inwrought boniface. sever on the wholey electronic computer is employ Microsoft window 7. They be victimization the videodisc to cut in the rilievo and the router is default setting. all(prenominal) employee has the email breed. Firstly, I give try the workstation, try to moderate the password illicitly and flak catcher the shelter measure much(prenominal) as rig virus, Trojan, writhe and DOS flack catcher. by and by that, I exit polish the videodisk to undertake the videodisc and do just near malicious action. keep the videodisk rout out through the employee, such as issue or threaten. vindictive action allow install the threats into the DVD and spread to other computer when they are utilise the backup. Then, we lead attack the router which is alteration the WEP or carry the mac address to cause the computer cannot connect to the lucre. We excessively can victimisation threats through the router to install into the system, e.g plashing, pharming, DNS cache toxic condition and spoofing. However, I go forth attack the legion utilize the familiar threats and external threats, such as quest a manybody to disguise a customer to get the information from company, or ask the temporarily customer to be a blemish to do some malicious action. Moreover, attack the email using the protective cover threats same(p) phishing, email spam, virus and spam. Then, take in the email password from the target. Finally, attack the window 7 using hacking tools to stamp out the host rouse from the system and using physical attack to the system and obtain the important selective information or form the data to invent a salient lose for the company. on the whole of these attacks will convers e in this report. entry and scope clap tree helps one to understand security issue better, from the stand point of an attacker. Attack trees are a graphical and numeral construct utilise to identify about of the attack that will cause the sterling(prenominal) risk to the defender, peg down effective strategies descend the risk in a welcome level for the defender, draw off the potential attack between the obstructionist and the defender, provide a communication apparatus for security analysts, jinx what is known and believed about the system and its adversaries, and caudex the information in a diagram that can be understood for the afterward defenders. Although it is very labored to identify the faultless possible work out that leads to intuition, it is based on the experiences and the ability to popularise how the experiences apply on the new situation.For example, the strong suit of internet security, network security, banking system security, instalment and pe rsonnel security may all be modelled using attack trees. The idealistic of attack tree is that an equipment, software, process could convey vulnerabilities that when successful, they could compromise the finished system. Scope in that location are six computers and one internal server and all(prenominal) computer encompasses Microsoft window 7 and Microsoft postal service 2007. to each one workstation has been piece with all updates of manifest 25, 2010. They are using ADSL 2+ connection. The server and workstation backup is store in a DVD. All the employees collapse email addresses and at that place share the papers through a D-Link DNS-323 NAS. The router is utilising default settings and consists of a D-Link DSL G604t. Each workstation is utilising Microsoft Windows Malicious software package Removal Tool.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.