Threat/Attack Analysis

Attack trees allow threats against system security to be modelled concisely in a graphical format. The effectiveness of internet security, network security, banking system security, installation and personnel security may all be modelled using attack trees.

In the following webinar we decided to model a threat example in our AttackTree+ software.  We took an article from www.wired.com where hackers remotely killed a Jeep Cherokee while driving 70 miles per hour on the freeway. Using this article we created an example in our AttackTree+ software.

Note: much of the failure rate data was made up using information available on the internet.

Let's Keep In Touch!

Subscribe to our newsletter to get the latest information on Isograph software.
 


By submitting this form, you are consenting to receive marketing emails from: . You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact