Computer security

Attack tree for breaking into a truecrypt container to get the files
Requirements :
-Inclusion of technical and non technical terms
-Inclusion of software and hardware components

  • 30 to 40 nodes needed
  • 5 to 8 words in each node
  • one side of page with technical terms and another page with non technical terms.