Professional Documents
Culture Documents
in Figure 13.14, suggest two further plausible attacks on the system and propose
Attack 1: A maliciouse user gain access to the system using an accredited user credentials.
Recognition:
Send a copy of order by email to authorized user with contact phone number.
Maintain user’s order history and check for unusual trading patterns.
Recovery:
impossible.
Resistance: Using a stronger authentication mechanism, such as digital certificates for the
Recognition:
Recovery:
transactions database.