0 valutazioniIl 0% ha trovato utile questo documento (0 voti)
34 visualizzazioni2 pagine
This document is an attack tree created by Rahul Khinvasara to outline ways to disclose proprietary secrets from Tekk Systems. The primary goals are to either use an insider at Tekk Systems or physically access the main gate. Subgoals include duplicating security cards, accessing surveillance cameras remotely, physically accessing network server buildings, attacking the web server by finding details like host names and passwords, and remotely attacking the intranet using a dial-up connection. The end goal is to monitor and leak confidential information from Tekk Systems.
This document is an attack tree created by Rahul Khinvasara to outline ways to disclose proprietary secrets from Tekk Systems. The primary goals are to either use an insider at Tekk Systems or physically access the main gate. Subgoals include duplicating security cards, accessing surveillance cameras remotely, physically accessing network server buildings, attacking the web server by finding details like host names and passwords, and remotely attacking the intranet using a dial-up connection. The end goal is to monitor and leak confidential information from Tekk Systems.
This document is an attack tree created by Rahul Khinvasara to outline ways to disclose proprietary secrets from Tekk Systems. The primary goals are to either use an insider at Tekk Systems or physically access the main gate. Subgoals include duplicating security cards, accessing surveillance cameras remotely, physically accessing network server buildings, attacking the web server by finding details like host names and passwords, and remotely attacking the intranet using a dial-up connection. The end goal is to monitor and leak confidential information from Tekk Systems.