subject

How to design the attack tree for this question? Suppose the previous version of the joinMeSummer website does not require the user login and only provides an embedded form for the user to submit their information such as the parent’s name, address, phone number, email address, the kids’ name, grade level, birthday, allergy info, insurance number, as well as credit card information to pay. After the parent successfully registered their kids for any summer camp week and paid the fee, a confirmation email will be sent to the parent’s email address. The website does use https to provide security. What are possible threats? Suppose an attacker wants to get the personal information about these kids and their family (e. g. phone number, address), draw an attack tree using this as the root node with at least 3 subnodes and two more levels.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 10:40
"it security policy enforcement and monitoring" respond to the following: describe how monitoring worker activities can increase the security within organizations. describe the rationale that managers should use to determine the degree of monitoring that the organization should conduct. explain the extent to which you believe an organization has the right to monitor user actions and traffic. determine the actions organizations can take to mitigate the potential issues associated with monitoring user actions and traffic.
Answers: 3
question
Computers and Technology, 23.06.2019 09:30
Write an essay on online collaboration, how to do it, the challenges, resolving the challenges, and consider whether the risks are greater than rewards. ( need )
Answers: 1
question
Computers and Technology, 23.06.2019 13:30
What is the primary difference between the header section of a document and the body? a. the body is displayed on the webpage and the header is not. b. the header is displayed on the webpage and the body is not. c. the tag for the body is self-closing, but the tags for the headers must be closed. d. the tag for the header is self closing, but the tag for the body must be closed.
Answers: 3
question
Computers and Technology, 25.06.2019 05:00
How many meatballs required for a larty of 25 adults and 6 children
Answers: 1
You know the right answer?
How to design the attack tree for this question? Suppose the previous version of the joinMeSummer...
Questions
question
History, 19.05.2020 16:14
question
Mathematics, 19.05.2020 16:14
question
Mathematics, 19.05.2020 16:14
question
Mathematics, 19.05.2020 16:14
question
Biology, 19.05.2020 16:14
Questions on the website: 13722359