Develop an attack tree for stealing a twitter handle

Assignment Help Computer Network Security
Reference no: EM13756136

Security framework

Recently, there have been several cases of someone losing possession of their Twitter account in a hacking attempt. Review the following two stories:

How Apple and Amazon Security Flaws Led to My Epic Hacking

How I Lost My $50,000 Twitter Username

Develop an attack tree for stealing a Twitter handle that encompasses the basics of these attacks, as well as other threat vectors you can think of. Your tree should include at least 25 nodes and be comprehensive. For an explanation of attack trees, refer to the following article: Schneier on Security

2 Evaluation Framework

In this question you will develop your own evaluation framework (like the one from the lecture on password alternatives) I ATTACHED . First choose a problem with a security aspect that has at least 4 competing solutions (try to come up with your own topic, however a few suggestions are below). To compare these solutions, come up with at least 3 security criteria and at least 3 non-security criteria (functionality, usability, deployability) that would be desirable for the solution to hold (ideally, they will conflict in such a way that no solutions will hold all of them). Determine a score for the evaluation of each property. The example in Lecture 2 used three scores: the solution did not meet the criteria, it almost held the property, and it fully held the property.

Explain each criteria, and exactly what must be true of the solution to get each possible score in your ranking. Then evaluate each solution against each criteria, justifying your score. Summarize this in a chart.

Reference no: EM13756136

Questions Cloud

Exchange of common stock for a building : Why are noncash transactions, such as the exchange of common stock for a building, included on a statement of cash flows? How are these noncash transactions disclosed?
What was the main principle of law that we got from romans : What was the main principle of law that we got from the romans?
What new method of anti-israeli activities did syria turn to : What new method of anti-Israeli activities did Syria turn to?
Charge of general ledger accounting : You are the assistance controller in charge of general ledger accounting at Riverside Bottling Company. Your company has a large loan from an insurance company. The loan agreement requires that the company's cash account balance be maintained at $..
Develop an attack tree for stealing a twitter handle : Develop an attack tree for stealing a Twitter handle that encompasses the basics of these attacks, as well as other threat vectors you can think of. Your tree should include at least 25 nodes and be comprehensive
How did the federal art project help depression-era artists : How did the federal art project help depression-era artists?
What are the major provisions of the law : What are the major provisions of the law and what environmental problems motivated the writing of his law? Be as specific as possible.
Aspect of this class did you find the most helpful : What aspect of this class did you find the most helpful? What would you change if you were given the opportunity?
Pros and cons of segregation of duties over cash : What are some internal controls related to cash? Why is control over cash important? What are the pros and cons of segregation of duties over cash? Why is a bank reconciliation considered an internal control over cash? How does it provide control?..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Decrypt the ciphertext message lfdph lvdzl frqtx huhg which

decrypt the ciphertext message lfdph lvdzl frqtx huhg which has been encryptedusing the caesar cipher. encrypt the

  Describe the purpose of a risk assessment

Describe the purpose of a risk assessment, risk scope and identify critical areas for an assessment. Select risk assessment methodology and give your rationale behind the one you chose.

  Calculates the hash value

Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's or..

  Incremental evaluation of a system

TCB subsets are said to leverage purely hierarchical domains ordered by privilege and explain the relation between these domains and protection rings.

  Seven phases of the systems development life cycle

iscuss and explain each of the seven phases of the systems development life cycle. Make sure your descriptions make connections between the different phases

  Implement client-server application to emulates ping utility

The goal of this assignment is to implement a client-server application which emulates the ping utility. It is also good practice because it implements the client-server architecture.

  Encrypt the plaintext by using vigenere cipher

Encrypt the following Plaintext using Vigenere cipher: Plaintext: stocks market is falling Key : one. Is Vigenere cipher monoalphabetic or polyalphabetic? Why?

  Describe diffie-hellman algorithm to exchange shared key

User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?

  How many bits is the encrypted message

How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit

  What sorts of protection is provided by the bank

What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.

  Consider a mac technique called cbc­mac

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final..

  Why is the nfs option grayed out on the share protocols page

Why is the NFS option grayed out on the Share Protocols page and According to the Server Manager console, what roles are currently installed on the computer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd