This repository has been archived on 2024-10-30. You can view files and clone it, but cannot push or open issues or pull requests.
swb6-it-sec/Lab05/documentation/part2/part2.tex

63 lines
2.3 KiB
TeX
Raw Normal View History

2022-06-16 12:46:50 +02:00
\section{Part 2: Attack Tree}
2022-06-23 08:53:03 +02:00
2022-06-23 09:27:07 +02:00
\subsection{Baum}
2022-06-23 17:29:05 +02:00
Siehe Abbildung \ref{tree:Attack tree}
\begin{sidewaysfigure}
2022-06-23 09:27:07 +02:00
\begin{forest}
for tree={
draw,
minimum height=1cm,
anchor=parent,
align=center,
child anchor=parent
},
2022-06-23 17:29:05 +02:00
[{Unauthorized Access to DB Data}, name=AD
[{No authentication}, angle below, color=red
2022-06-23 17:40:25 +02:00
[{Access to\\server room}, color=red, angle below
[{Unsupervised\\in building}, color=red]
[{Access to\\the building}, color=teal
[{Bribe\\security\\guard\\100.000€}, color=teal]
[{Disguise yourself\\as fireman\\1.000€}, angle below, color=red
[{Steal\\fireman\\clothes}, color=red]
[{Activate\\firealarm}, color=teal]
[{firealarm\\disables\\locks}, color=red]
]
[{Break into\\building}, color=red
[{Hire crew\\for heist}, color=red]
]
2022-06-23 17:29:05 +02:00
]
2022-06-23 10:08:06 +02:00
]
2022-06-23 09:27:07 +02:00
]
2022-06-23 17:29:05 +02:00
[{Harddrives unencrypted}, color=red, angle below
2022-06-23 17:40:25 +02:00
[{Unsupervised\\near harddrives}, color=red]
2022-06-23 17:29:05 +02:00
[{Access to the harddrives}, color=teal
[{Collect harddrives\\for cleansing}, angle below, color=teal
2022-06-23 17:40:25 +02:00
[{Get company\\to hire you\\50.000€}, color=teal]
2022-06-23 17:29:05 +02:00
[{Work in\\data cleansing}, color=teal]
]
2022-06-23 10:08:06 +02:00
]
2022-06-23 09:27:07 +02:00
]
2022-06-23 17:29:05 +02:00
[{Access to db terminal}, color=teal
[{Access to\\SSH Keys}, color=red
[{Access to\\Key storage}, angle below, color=red
[{Employee uses\\bad password}, color=teal]
2022-06-23 17:40:25 +02:00
[{Access to\\employee laptop\\10.000€}, color=teal]
2022-06-23 17:29:05 +02:00
]
2022-06-23 10:08:06 +02:00
]
2022-06-23 17:29:05 +02:00
[{Flaw in\\Authentication}, color=teal
2022-06-23 17:40:25 +02:00
[{MITM\\1.000€}, color=teal]
[{Spoofing\\10.000€}, color=teal]
2022-06-23 10:08:06 +02:00
]
2022-06-23 09:27:07 +02:00
]
]
\end{forest}
2022-06-23 17:29:05 +02:00
\caption{Attack tree}
\label{tree:Attack tree}
\end{sidewaysfigure}
2022-06-23 09:27:07 +02:00
\subsection{Kosten des günstigsten Angriffs}
2022-06-23 17:40:25 +02:00
Der günstigste Angriff kann bei einer Sicherheitslücke in der Authentifizierung ein Man in the Middle Attack oder Spoofing sein. Dabei können je nach Aufwand und Dauer Kosten entstehen. (1.000-10.000€)