Carry out a STRIDE analysis for the system in the previous
problem, and list the STRIDE analysis
table. Based on the table, identify three possible attacks to the
vehicle and mitigation methods for
each of them.
Now consider the goal of spoofing the identity of a user to get
access to the vehicle. Can you
develop an attack tree to list possible attack methods
systematically?
Carry out a STRIDE analysis for the system in the previous problem, and list the STRIDE analysis table. Based on the tab
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am