2022-06-16 12:46:50 +02:00
\section { Part 2: Attack Tree}
2022-06-23 08:53:03 +02:00
2022-06-23 09:27:07 +02:00
\subsection { Baum}
2022-06-27 13:59:59 +02:00
Siehe Abbildung \myref { tree:Attack tree}
2022-06-23 17:29:05 +02:00
2022-06-27 14:11:32 +02:00
\subsection { Kosten des günstigsten Angriffs}
Der günstigste Angriff kann bei einer Sicherheitslücke in der Authentifizierung ein Man in the Middle Attack oder Spoofing sein. Dabei können je nach Aufwand und Dauer Kosten entstehen. (1.000-10.000€)
\begin { rotatepage}
2022-06-23 17:29:05 +02:00
\begin { sidewaysfigure}
2022-06-23 09:27:07 +02:00
\begin { forest}
for tree={
draw,
minimum height=1cm,
anchor=parent,
align=center,
child anchor=parent
} ,
2022-06-23 17:29:05 +02:00
[{ Unauthorized Access to DB Data} , name=AD
2022-06-23 17:42:39 +02:00
[{ No local authenti-\\ cation on server} , angle below, color=red
[{ Access to server room} , color=red, angle below
2022-06-23 17:40:25 +02:00
[{ Unsupervised\\ in building} , color=red]
[{ Access to\\ the building} , color=teal
[{ Bribe\\ security\\ guard\\ 100.000€} , color=teal]
[{ Disguise yourself\\ as fireman\\ 1.000€} , angle below, color=red
[{ Steal\\ fireman\\ clothes} , color=red]
[{ Activate\\ firealarm} , color=teal]
[{ firealarm\\ disables\\ locks} , color=red]
]
[{ Break into\\ building} , color=red
[{ Hire crew\\ for heist} , color=red]
]
2022-06-23 17:29:05 +02:00
]
2022-06-23 10:08:06 +02:00
]
2022-06-23 09:27:07 +02:00
]
2022-06-23 17:29:05 +02:00
[{ Harddrives unencrypted} , color=red, angle below
2022-06-23 17:40:25 +02:00
[{ Unsupervised\\ near harddrives} , color=red]
2022-06-23 17:29:05 +02:00
[{ Access to the harddrives} , color=teal
[{ Collect harddrives\\ for cleansing} , angle below, color=teal
2022-06-23 17:40:25 +02:00
[{ Get company\\ to hire you\\ 50.000€} , color=teal]
2022-06-23 17:29:05 +02:00
[{ Work in\\ data cleansing} , color=teal]
]
2022-06-23 10:08:06 +02:00
]
2022-06-23 09:27:07 +02:00
]
2022-06-23 17:29:05 +02:00
[{ Access to db terminal} , color=teal
[{ Access to\\ SSH Keys} , color=red
[{ Access to\\ Key storage} , angle below, color=red
[{ Employee uses\\ bad password} , color=teal]
2022-06-23 17:40:25 +02:00
[{ Access to\\ employee laptop\\ 10.000€} , color=teal]
2022-06-23 17:29:05 +02:00
]
2022-06-23 10:08:06 +02:00
]
2022-06-23 17:29:05 +02:00
[{ Flaw in\\ Authentication} , color=teal
2022-06-23 17:40:25 +02:00
[{ MITM\\ 1.000€} , color=teal]
[{ Spoofing\\ 10.000€} , color=teal]
2022-06-23 10:08:06 +02:00
]
2022-06-23 09:27:07 +02:00
]
]
\end { forest}
2022-06-23 17:29:05 +02:00
\caption { Attack tree}
\label { tree:Attack tree}
\end { sidewaysfigure}
2022-06-27 14:11:32 +02:00
\end { rotatepage}