This repository has been archived on 2024-10-30. You can view files and clone it, but cannot push or open issues or pull requests.
swb6-it-sec/Lab05/documentation/part2/part2.tex

31 lines
No EOL
819 B
TeX

\section{Part 2: Attack Tree}
\subsection{Baum}
\begin{forest}
for tree={
draw,
minimum height=1cm,
anchor=parent,
align=center,
child anchor=parent
},
[{Order a Car at the online shop}, name=AD
[{Flood the System with Orders}
[{Use random\\IP Address}]
[{Pay with stolen\\bank accounts}]
]
[{Use another users account}, angle below
[{Buy the car}]
[{Pay using\\users payment}]
]
[{Attack the Payment system}, color my roots=red
[{SQL injection}]
[{DDOS Attack}, color my roots=red]
]
]
\end{forest}
\subsection{Kosten des günstigsten Angriffs}
Um das Bezahlsystem zu überfluten kann man ein DDOSaS mieten und das Bezahlsystem angreifen.