Securing Higher Grades Costing Your Pocket? FLAT 25% OFF on all orders
loader

Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

Stuck on Your Question?

Get 24x7 live help from our Top Tutors. All subjects covered.

Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

loader
250 words

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Students Who Viewed This Also Studied

11 Pages
ICT40118 Information Technology

Task: Overview of the Assessment   The purpose of this assessment is to assess your competence in creating a deployment solution via an open source server.The following topics are covered in thi ...

Course

ICT40118

Type

Programming

Subject

It Write Up

University

Tafe NSW

1 Page
Complementary Materials

Assessment 2 – complementary materials Current database The current database that Fibre Fashion use is a product the y have purchased to store customer details : ...

Course

MIS500

Subject

It Write Up

University

Torrens University

Season

Spring

15 Pages
Sale or Return

new client Sale or return placed, then cancelled not interested to view viewed, didn't place Appt order to come viewed look book cancelled appt sent pack FIBRE RETAILER LOCATION BUDW19Res '18 SS18AW ...

Course

MIS500

Subject

It Write Up

University

Torrens University

Season

Spring

0 Page
Contemporary Busines

...

Course

MIS500

Subject

It Write Up

University

Torrens University

Season

Spring

CMP71001-Cybersecurity

Question

Answered

Task 1 Case Study

Cross-site Scripting (XSS), Cross-site Request Forgery (CSRF) and Structured Query Language (SQL) Injections are common attacks, exploiting web application vulnerabilities. Your task is to select one case study example of one attack type from either XSS, CSRF or SQL injection as the basis for your report and explain (and graphically depict) all components of the attack by addressing the following three requirements: 

1. Develop a detailed walkthrough of how your chosen attack type would theoretically operate in the real-world. This section should clearly represent each stage of the attack with supportive discussions.

2. Select one CVE (Common Vulnerabilities and Exposures) and proceed to identify and explain the intricacies of that real-world incident that eventuated based on your chosen attack type.

3. By explaining your selected real-world incident, you should at a minimum answer the following

questions:

• What was the outcome of your chosen incident?

• What was the impact of your chosen incident?

• Identification of the personal identifiable information (PII) that was held, used, and collected by the organisation.

• Discuss the C.I.A triad and how these principles relate to the information security breach, i.e., what was breached in relation to C.I.A?

• What threats and vulnerabilities to the information exist in the case study?

• What protections were in place; what worked and what failed in this particular case?

• Discuss the lessons learnt from the breach, for example, legal, financial, risk.

• What did the organisation do after the breach, i.e., what happened after the fact?

• Why was this breach such an important case to learn from?

Task 2: Attack Tree on “obtain your friend’s password” 

Attack (or threat) trees are becoming increasingly popular in many fields as a means of visualising information. As presented by Dekker (2015) attack trees are; flexible, visual and formal, yet provide a means of portraying scenarios, encourage brainstorming activities, and allows organisations to apply a defence in depth approach to the identified threats. 

Among many things Attack Trees help with visualising all the potential ways any given organisation or system may be attacked. It assists with conceptualising; asset identification/classification, threats, vulnerabilities, exploits and many more aspects of cybersecurity risk management.

It is important that you understand how to develop and analyse attack trees for the purposes of not only this assignment (or potential exam questions) but for your future career. Bruce Schneier is a respected cybersecurity expert who has written extensively on the creation of attack trees. You are strongly advised to research this information and ensure you have grasped the concept of attack trees, and its associated characteristics. You should also research more attack tree structures as part of this task

You will attempt to develop your own attack tree. Using the overall goal of "obtain your friend's login password" develop one or more attack trees which demonstrate the different technical and non-technical approaches you could use to acquire ‘the password’.

For the purposes of this activity, you should aim to have approximately 25 nodes, presented on multiple levels. The above example has approximately 13 nodes, for example. For the first level, try to be creative in how you split your tree up. So, this means you should try to avoid using ‘technical’ and ‘non-technical’ as your top two headings. In addition, you should aim to have 3-6 words per node to ensure that it is explained sufficiently.

Microsoft Visio is a popular tool that can be used to develop Attack Trees. However, any brainstorming tools will be equally suitable. There are plenty of freely available brainstorming tools that can be found by doing a simple search on the Internet. However, whenever you download software it is always advisable to scan the product with appropriate anti-virus software beforehand.

Finally, briefly discuss in a conclusion for this task how might an attack tree analysis have been helpful for the organisation(s) involve in task 1.

CMP71001-Cybersecurity

Answer in Detail

Solved by qualified expert

Get Access to This Answer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

20 More Pages to Come in This Document. Get access to the complete answer.

More CMP71001 CMP71001-Cybersecurity: Questions & Answers

Q
icon

We aren't endorsed by this University

ICT40118 Information Technology

Task: Overview of the Assessment   The purpose of this assessment is to assess your competence in creating a deployment solution via an open source server.The following topics are covered in this assessment:• TCP/IP Configuration• Obtain deployment software• Deployment Plan• Install an ...

View Answer
Q
icon

We aren't endorsed by this University

Complementary Materials

Assessment 2 – complementary materials Current database The current database that Fibre Fashion use is a product the y have purchased to store customer details : ...

View Answer
Q
icon

We aren't endorsed by this University

Sale or Return

new client Sale or return placed, then cancelled not interested to view viewed, didn't place Appt order to come viewed look book cancelled appt sent pack FIBRE RETAILER LOCATION BUDW19Res '18 SS18AW18Res '17 SS17 VIC Shop 20 Fairfield - Shop 21 Hawthorn 3,469 2,500 Shop 23 Balwyn S ...

View Answer
Q
icon

We aren't endorsed by this University

Contemporary Busines

...

View Answer

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.io then please raise the content removal request.

Choose Our Best Expert to Help You

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile Chat Now
Have any Query?
close
Subtraction Payment required!

Only one step away from your solution of order no.