subject

How to design the attack tree for this question? Suppose the previous version of the joinMeSummer website does not require the user login and only provides an embedded form for the user to submit their information such as the parent’s name, address, phone number, email address, the kids’ name, grade level, birthday, allergy info, insurance number, as well as credit card information to pay. After the parent successfully registered their kids for any summer camp week and paid the fee, a confirmation email will be sent to the parent’s email address. The website does use https to provide security. What are possible threats? Suppose an attacker wants to get the personal information about these kids and their family (e. g. phone number, address), draw an attack tree using this as the root node with at least 3 subnodes and two more levels.

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 02:30, jalaholmes2027
Three out of five seniors remain undecided about a college major at the end of their senior year.
Answers: 3
image
Computers and Technology, 23.06.2019 04:31, mona92
Which of the following is not a way in which trees benefit the environment? a. they remove a significant amount of carbon dioxide from the atmosphere. b. they remove a significant amount of oxygen from the atmosphere. c. their roots hold soil in place, reducing rates of erosion. d. they remove ozone and particulates from the atmosphere. select the best answer from the choices provided a b c d
Answers: 1
image
Computers and Technology, 24.06.2019 00:30, bsonicx
The best definition of an idiom is a. a word or phrase that describes a noun b. a word or phrase describing a verb c. a phrase containing figurative language in which the word expresses a different idea from its exact meaning d. a phrase that compares two unlike objects or ideas
Answers: 2
image
Computers and Technology, 24.06.2019 03:00, 2020IRodriguez385
With editing, word automatically displays a paste options button near the pasted or moved text. a. cut-and-paste b. drag-and-drop c. inline d. copy-and-carry
Answers: 1
You know the right answer?
How to design the attack tree for this question? Suppose the previous version of the joinMeSummer...

Questions in other subjects:

Konu
Mathematics, 14.04.2021 23:10
Konu
Mathematics, 14.04.2021 23:10