Select an attack, such as “Break into Instructor’s Lab Computer” or “Steal Credit Card Number from Online User,” and then develop an attack tree for it. The tree should have at least four levels with three boxes on each level. Share your tree with at least two other learners and ask if they can think of other attacks that they would add.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here