1
Rahul Khinvasara 100344610 Assignment 1-Attack Tree 9/30/2015 Disclosure of Tekk Systems proprietary secrets: OR A. Use an insider that works in Tekk Systems OR 1. Planting one yourself 2. Trusting one that works there B. Physically get through the main gate OR 3. Duplicating security card keys from the insider 4. Having the insider give you access C. Attack the surveillance cameras remotely AND 5. Get IP address and password 6. Use a continuous loop for the feed D. Physically access Network services building OR 7. Get security card from insider 8. Use the insider to help you get access to server rooms E. Attack Tekk Systems Web Server AND 9. Find Host Name 10. Find Network address range 11. Find the firewall IP address 12. Run brute force password 13. Monitor information leaks G. Attack Tekk Systems intranet remotely using dial-up AND 14. Use public switched telephone network (PSTN) 15. Gain access remote access server 16. Gain access to Intranet. 17. Monitor information leaks

Assignment 1- InFR 2600

Embed Size (px)

DESCRIPTION

assign

Citation preview

Page 1: Assignment 1- InFR 2600

Rahul Khinvasara 100344610 Assignment 1-Attack Tree 9/30/2015

Disclosure of Tekk Systems proprietary secrets:OR     A. Use an insider that works in Tekk Systems

OR    1. Planting one yourself2. Trusting one that works there

B. Physically get through the main gateOR 3. Duplicating security card keys from the insider

4. Having the insider give you accessC. Attack the surveillance cameras remotely

AND   5. Get IP address and password6. Use a continuous loop for the feed

D. Physically access Network services buildingOR     7. Get security card from insider

8. Use the insider to help you get access to server rooms E. Attack Tekk Systems Web Server

AND 9. Find Host Name10. Find Network address range 11. Find the firewall IP address

12. Run brute force password 13. Monitor information leaks

G. Attack Tekk Systems intranet remotely using dial-upAND 14. Use public switched telephone network (PSTN)

15. Gain access remote access server 16. Gain access to Intranet.17. Monitor information leaks