Attack on computer

 

Describe how an attacker could use a sniffer in conjunction with a Trojan to successfully gain access to sensitive data.
Describe how the attacker could use the Flaw Hypothesis Methodology to potentially gain a foothold.
Some readings:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication500-268v1.1.pdf

This question has been answered.

Get Answer