Attack tree
Consider the following scenario of attack and construct a Attacker tree:
Smart Droid a well know company-in mobile devices base solution for employ managements has just in placed a new system in air university. The-new system have two method of employ verification 1) written password 2) facial recognition. In case of written password a device on the entry of each department is in place. When ever the employ enters the department he / she first enter his or her id and then the door gets open else he/ she is not allowed to enter the region. On the other hand the facial recognition system is in place at the gate way of Air university once the face is recognized it send the image to the server through an sub server which is connect through wifi node with the device on the gate. During rush hours system show delay in the processing of facial recognition. The attendance of each user on recognition show on the display screen placed in the main hall of each department.
Comments
Leave a comment