Attack Tree is a good way to move threat scenarios from the realm of art form to science. It can be used to map out the various components of a threat scenario and organize them into a more easily understood structure. It’s provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes. Attack Tree also provide a systematic way to compare existing Threat sources with Vulnerabilities to identify the most likely exploits that Threats would use.
More Posts
Latest Post
-
The Development of a Synthetic Mini-motor with Tremendous Power
-
Data Storage could be revolutionized by a breakthrough in Energy-efficient Avalanche-based Amorphization
-
Zinc Chloride – an inorganic chemical
-
Zinc Gluconate – zinc salt of gluconic acid
-
New Continuous Reaction Technology can help Turn Plant Waste into a Sustainable Aircraft Fuel
-
A System Driven by AI quickly and accurately Detects Harmful Gasses