Answer to Question #309906 in Computer Networks for Junaid

Question #309906

Attack tree





Consider the following scenario of attack and construct a Attacker tree:





Smart Droid a well know company-in mobile devices base solution for employ managements has just in placed a new system in air university. The-new system have two method of employ verification 1) written password 2) facial recognition. In case of written password a device on the entry of each department is in place. When ever the employ enters the department he / she first enter his or her id and then the door gets open else he/ she is not allowed to enter the region. On the other hand the facial recognition system is in place at the gate way of Air university once the face is recognized it send the image to the server through an sub server which is connect through wifi node with the device on the gate. During rush hours system show delay in the processing of facial recognition. The attendance of each user on recognition show on the display screen placed in the main hall of each department.

0
Service report
It's been a while since this question is posted here. Still, the answer hasn't been got. Consider converting this question to a fully qualified assignment, and we will try to assist. Please click the link below to proceed: Submit order

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

No comments. Be the first!

Leave a comment

LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS