home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page794.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  92KB  |  817x1045  |  8-bit (256 colors)
Labels: chat room | clock | crt screen | hakham | monitor | sky
OCR: 726 SECTION CHAPTER 1.2 What is an attack tree? Attack trees offer another way to get a handle on potential threats An attack tree s hierarchical diagram of potential FIGURE 12-56 attacks against a system. The root of the upside-down tree-shaped diagram Attack trees are used by secu- represents an attacker's ultimate objective, such as stealing passwords. rity analysts in many fields. This The branches of the tree represent actions that attackers might take diagram illustrates an attack achieve the objective. By tracing paths through the diagram, developers tree that might be devised by a can discover which kinds attacks are easiest which are most difficult bank security officer examining detect, and which have the potential to cause the most damage Figure the vulnerability of the bank 12- ...