Based on your answer to Exercise E11, develop an authentication policy for Alice, assuming she faces weak authentication threats at home.
EXERCISE E11
Review news reports from a specific data breach. Choose a breach for which plausible news reports have identified how the attack occurred and have identified the likely attacker. This could be a group project in which individuals work on different reports. Complete the following reports:
a. Write a threat agent profile of the likely attacker.
b. Write an attack scenario for the data breach.
c. Write an attack case study about the data breach.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here