\documentclass[preview]{standalone} \input{../../base.tex} \begin{document} \begin{figure} \begin{minipage}[c]{0.5\textwidth}% % ADT \centering \scalebox{.6}{ \begin{tikzpicture}[ every node/.style={ultra thick,draw=red,minimum size=6mm}, node distance=1.5cm] % Or Gate (Obtain admin priviledges) \node[or gate US,point up,logic gate inputs=nn] (OAP) {\rotatebox{-90}{\gate{OAP}}}; % Or Gate (Access CLI) \node[or gate US,point up,logic gate inputs=nn, below = 13mm of OAP.input 1,yshift=14mm] (ACLI) {\rotatebox{-90}{\gate{ACLI}}}; \draw (ACLI.east) -- ([yshift=0.15cm]ACLI.east) -| (OAP.input 1); % Corrupt operator \node[state, below = 9mm of ACLI.input 1, xshift=-8mm] (co) {\leaf{co}}; \draw (co.north) -- ([yshift=0.15cm]co.north) -| (ACLI.input 1); % NAnd node (Enter computer centre succesful) \node[and gate US,point up,logic gate inputs=ni, below = 21.5mm of ACLI, yshift = 8.6mm] (ECCS) {\rotatebox{-90}{\gate{ECCS}}}; \draw (ECCS.east) -- (ACLI.input 2); % Or Gate (Enter computer centre) \node[or gate US,point up,logic gate inputs=nn, below = 12mm of ECCS.input 1,yshift=14mm] (ECC) {\rotatebox{-90}{\gate{ECC}}}; \draw (ECC.east) -- ([yshift=0.15cm]ECC.east) -| (ECCS.input 1); % Break into computer centre \node[state, below = 5mm of ECC.input 1, xshift=-4.5mm] (bcc) {\leaf{bcc}}; \draw (bcc.north) -- ([yshift=0.15cm]bcc.north) -| (ECC.input 1); % Computer centre guest left unwatched \node[state, below = 5mm of ECC.input 2, xshift=4.5mm] (ccg) {\leaf{ccg}}; \draw (ccg.north) -- ([yshift=0.15cm]ccg.north) -| (ECC.input 2); % defence node (Secure coding rooms) \node[rectangle,draw=Green,minimum size=8mm, below = 5.5mm of ECCS.west, xshift=1.65mm] (scr) {\leaf{scr}}; \draw (scr.north) -- (ECCS.input 2); % Or Gate (Get Sys Admin password) \node[or gate US,point up,logic gate inputs=nnnn, below = 14.5mm of OAP.input 2,yshift=-3mm] (GSAP) {\rotatebox{-90}{\gate{GSAP}}}; \draw (GSAP.east) -- ([yshift=0.15cm]GSAP.east) -| (OAP.input 2); % Sequential NAnd node (Get admin password successful) \node[and gate US,point up,logic gate inputs=ni, seq=12pt, below = 14mm of GSAP.west, yshift = 8.9mm] (GAPS) {\rotatebox{-90}{\gate{GAPS}}}; \draw (GAPS.east) -- (GSAP.input 1); % Sequential And node (Get admin password) \node[and gate US,point up,logic gate inputs=nn, seq=6pt, below = 11mm of GAPS.input 1, yshift = 4.2mm] (GAP) {\rotatebox{-90}{\gate{GAP}}}; \draw (GAP.east) -- (GAPS.input 1); % Obtain psw file \node[state, below = 5mm of GAP.input 1, xshift=-4.5mm] (opf) {\leaf{opf}}; \draw (opf.north) -- ([yshift=0.15cm]opf.north) -| (GAP.input 1); % Find guessable password \node[state, below = 5mm of GAP.input 2, xshift=4.5mm] (fgp) {\leaf{fgp}}; \draw (fgp.north) -- ([yshift=0.15cm]fgp.north) -| (GAP.input 2); % defence node (Two-level authentication) \node[rectangle,draw=Green,minimum size=8mm, below = 4mm of GAPS.input 2, xshift = 8mm] (tla) {\leaf{tla}}; \draw (tla.north) -- ([yshift=0.15cm]tla.north) -| (GAPS.input 2); % NAnd node (Look over SA shoulder successful) \node[and gate US,point up,logic gate inputs=ni, below = 14mm of GSAP.west, yshift = -20mm] (LSAS) {\rotatebox{-90}{\gate{LSAS}}}; \draw (LSAS.east) -- ([yshift=0.12cm]LSAS.east) -| (GSAP.input 2); % Sequential And node (Look over SA shoulder) \node[and gate US,point up,logic gate inputs=nnn, seq=6pt, below = 12mm of LSAS.input 1, yshift = 5.3mm] (LSA) {\rotatebox{-90}{\gate{LSA}}}; \draw (LSA.east) -- (LSAS.input 1); % Befriend system administrator \node[state, below = 3mm of LSA.input 1, xshift=-7.5mm] (bsa) {\leaf{bsa}}; \draw (bsa.north) -- ([yshift=0.15cm]bsa.north) -| (LSA.input 1); % Visit SA at work \node[state, below = 3mm of LSA.input 2] (vsa) {\leaf{vsa}}; \draw (vsa.north) -- (LSA.input 2); % Spy SA terminal \node[state, below = 3mm of LSA.input 3, xshift=7.5mm] (sat) {\leaf{sat}}; \draw (sat.north) -- ([yshift=0.15cm]sat.north) -| (LSA.input 3); % defence node (No visits policy) \node[rectangle,draw=Green,minimum size=8mm, below = 4mm of LSAS.input 2, xshift = 7.5mm] (nv) {\leaf{nv}}; \draw (nv.north) -- ([yshift=0.15cm]nv.north) -| (LSAS.input 2); % NAnd node (Trojan horse for SA) \node[and gate US,point up,logic gate inputs=ni, below = 13.6mm of GSAP.west, yshift = -48.5mm] (TSA) {\rotatebox{-90}{\gate{TSA}}}; \draw (TSA.east) -- ([yshift=0.3cm]TSA.east) -| (GSAP.input 3); % Trojan horse for SA \node[state, below = 5.4mm of TSA.input 2, xshift = -10mm] (th) {\leaf{th}}; \draw (th.north) -- ([yshift=0.15cm]th.north) -| (TSA.input 1); % Or Gate Defence (Defence against trojan horses) \node[or gate US,point up,logic gate inputs=nn,draw=Green, below = 12.4mm of TSA.input 2,yshift=4.25mm] (DTH) {\rotatebox{-90}{\gate{DTH}}}; \draw (DTH.east) --(TSA.input 2); % defence node (Watchdog system daemon) \node[rectangle,draw=Green,minimum size=8mm, below = 5mm of DTH.input 1, xshift = -6mm] (wd) {\leaf{wd}}; \draw (wd.north) -- ([yshift=0.15cm]wd.north) -| (DTH.input 1); % defence node (No visits policy) \node[rectangle,draw=Green,minimum size=8mm, below = 5mm of DTH.input 2, xshift = 6mm] (efw) {\leaf{efw}}; \draw (efw.north) -- ([yshift=0.15cm]efw.north) -| (DTH.input 2); % Corrupt SA \node[state, below = 7mm of GSAP.input 4, xshift=60mm] (csa) {\leaf{csa}}; \draw (csa.north) -- ([yshift=0.375cm]csa.north) -| (GSAP.input 4); \end{tikzpicture} } \end{minipage} \begin{minipage}[c]{0.5\textwidth}% \centering % information \scalebox{.75}{\parbox{\linewidth}{% \begin{tabular}{l@{$\,:\;$}l@{~}l@{~}r} \multicolumn{2}{l}{\textbf{Name}} & \textbf{Cost} & \textbf{Time} \\ \hline \gate{OAP} & obtain admin privileges & \EUR{0} & 0~m \\ \gate{GSAP} & get SA password & \EUR{0} & 0~m \\ \gate{ACLI} & access c.c.\ CLI & \EUR{0} & 2~m \\ \gate{TSA} & trojan horse for SA & \EUR{0} & 0~m \\ \gate{DTH} & defence against trojans & \EUR{0} & 0~m \\ \gate{LSAS} & LSA successful & \EUR{0} & 0~m \\ \gate{LSA} & look over SA shoulder & \EUR{0} & 0~m \\ \gate{GAPS} & GAP successful & \EUR{0} & 2~m \\ \gate{GAP} & get admin password & \EUR{0} & 10~m \\ \gate{ECCS} & enter c.c.\ successful & \EUR{0} & 1~h \\ \gate{ECC} & enter computer centre & \EUR{0} & 0~d \\ \leaf{csa} & corrupt Sys.\ Admin. & \EUR{5k} & 5~d \\ \leaf{efw} & E-Mail firewall & \EUR{3k} & 0~m \\ \leaf{wd} & watchdog sys.\ daemon & \EUR{2k} & 5~m \\ \leaf{th} & trojan horse SA & \EUR{100} & 3~d \\ \leaf{nv} & no-visits policy & \EUR{0} & 0~d \\ \leaf{sat} & spy SA terminal & \EUR{0} & 30~m \\ \leaf{vsa} & visit SA at work & \EUR{20} & 2~d \\ \leaf{bsa} & befriend Sys.\ Admin. & \EUR{500} & 14~d \\ \leaf{tla} & two-level authentic. & \EUR{5} & 1~m \\ \leaf{fgp} & find guessable pass. & \EUR{0} & 1~d \\ \leaf{opf} & obtain password file & \EUR{100} & 3~d \\ \leaf{scr} & secure coding rooms & \EUR{5k} & 0~d \\ \leaf{ccg} & c.c.\ guest unwatched & \EUR{100} & 5~d \\ \leaf{bcc} & break-in comp.\ centre & \EUR{6k} & 2~d \\ \leaf{co} & corrupt operator & \EUR{4k} & 4~d \\ \end{tabular} }} \end{minipage} \end{figure} \end{document}