subject

How to design the attack tree for this question? Suppose the previous version of the joinMeSummer website does not require the user login and only provides an embedded form for the user to submit their information such as the parent’s name, address, phone number, email address, the kids’ name, grade level, birthday, allergy info, insurance number, as well as credit card information to pay. After the parent successfully registered their kids for any summer camp week and paid the fee, a confirmation email will be sent to the parent’s email address. The website does use https to provide security. What are possible threats? Suppose an attacker wants to get the personal information about these kids and their family (e. g. phone number, address), draw an attack tree using this as the root node with at least 3 subnodes and two more levels.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 12:00
If you embed a word table into powerpoint, what happens when you make edits to the embedded data? a. edits made to embedded data change the data in the source file; however, edits made to the source file will not be reflected in the embedded data. b. edits made to embedded data will change the data in the source file, and edits made to the source file will be reflected in the embedded data. c. edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data. d. edits made to embedded data don't change the data in the source file; however, edits made to the source file will be reflected in the embedded data.
Answers: 1
question
Computers and Technology, 24.06.2019 02:00
How are we able to create photographs differently than 100 years ago? explain your answer in relation to your photograph you selected.
Answers: 1
question
Computers and Technology, 24.06.2019 03:00
What is one potential problem associated with an organization purchasing new technology early in its lifecycle
Answers: 1
question
Computers and Technology, 24.06.2019 12:00
How can we take picture in this app
Answers: 1
You know the right answer?
How to design the attack tree for this question? Suppose the previous version of the joinMeSummer...
Questions
question
SAT, 08.12.2021 21:30
question
Mathematics, 08.12.2021 21:30
question
Mathematics, 08.12.2021 21:30
question
Advanced Placement (AP), 08.12.2021 21:30
question
Chemistry, 08.12.2021 21:30
Questions on the website: 13722362