Answered Essay: Develop an attack tree in which the root node represents disclosure of proprietary secrets. Include physical, social en

1.7      Consider a company whose operations are housed in two buildings on the same property, one building is headquarters, the other building contains network and computer services. The property is physically protected by a fence around the perimeter. The only entrance to the property is through the fenced perimeter. In addition to the perimeter fence, physical security consists of a guarded front gate. The local networks are split between the Headquarters’ LAN and the Network Services’ LAN. Internet users connect to the Web server through a firewall. Dial-up users get access to a particular server on the Network Services’ LAN.

Develop an attack tree in which the root node represents disclosure of proprietary secrets. Include physical, social engineering, and technical attacks. The tree may contain both AND and OR nodes. Develop a tree that has at least 15 leaf nodes.

Expert Answer


The tree is as follows:

Compromise on survivability: Disclosure of the proprietary secrets of the company X.

OR 1. Physically scavenge discard the items from X.

OR       1. Inspect the contents of the site which is under the category of dumpster

2. After removal from the site, inspect refuse

2. From the X machines, monitor the emanations

AND    1.To identify the position which is optimal, do the survey of the physical perimeter

2. Get the equipment which are necessary to monitor

3. Setup the site which is the site of monitoring

4. Monitor the emanation from the site

3. Recruitment of the helpful and trusted X insider

OR       1. For the trusted insider, plant the spy

2. Use the insiders which are trusted and already exist

4. Accessing the machines and the networks of the company X physically

OR       1. For the accessibility on-site to the Intranet, get physical

2. Get the access of the machines physically

5. With the help of the internet connection, attack the Intranet of the company X

OR       1. To get the information of the leakage, monitor the communications

2. Over the internet, get the process which is trustworthy to send the information

which is sensitive.

3. For the web servers, get the privilege access

6. With the PIN and the connection of X itself, attack the intranet of X

OR       1. For obtain the information about the leaking of the sensitive information, monitor

the communication over the public telephone network

2. Get the access of the machines on the connected Intranet with the help of the


Buy Essay
Calculate your paper price
Pages (550 words)
Approximate price: -

Help Me Write My Essay - Reasons:

Best Online Essay Writing Service

We strive to give our customers the best online essay writing experience. We Make sure essays are submitted on time and all the instructions are followed.

Our Writers are Experienced and Professional

Our essay writing service is founded on professional writers who are on stand by to help you any time.

Free Revision Fo all Essays

Sometimes you may require our writers to add on a point to make your essay as customised as possible, we will give you unlimited times to do this. And we will do it for free.

Timely Essay(s)

We understand the frustrations that comes with late essays and our writers are extra careful to not violate this term. Our support team is always engauging our writers to help you have your essay ahead of time.

Customised Essays &100% Confidential

Our Online writing Service has zero torelance for plagiarised papers. We have plagiarism checking tool that generate plagiarism reports just to make sure you are satisfied.

24/7 Customer Support

Our agents are ready to help you around the clock. Please feel free to reach out and enquire about anything.

Try it now!

Calculate the price of your order

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.


Let us write that nagging essay.


Submit Your Essay/Homework Instructions

By clicking on the "PLACE ORDER" button, tell us your requires. Be precise for an accurate customised essay. You may also upload any reading materials where applicable.


Pick A & Writer

Our ordering form will provide you with a list of writers and their feedbacks. At step 2, its time select a writer. Our online agents are on stand by to help you just in case.


Editing (OUR PART)

At this stage, our editor will go through your essay and make sure your writer did meet all the instructions.


Receive your Paper

After Editing, your paper will be sent to you via email.