Attack trees are introduced by Bruce Schneier, in the year 1999, as a methodological and graphical way to analyze various attacks in a system. Since its introduction, attack trees have been used in various ways by security researchers. I personally love their simplicity and comprehensiveness. In this blog, I will talk about a few real life applications of attack trees. Discover Multi Step Attacks in Computer Networks Computer networks are growing more complex day by day. There is a multilayer security deployed in every organization serious about security. As a result, attacker needs to perform multi step attacks to reach a goal, say compromising a database server. A multi-step attack is defined as a sequence of exploits that can lead to a goal. Attack trees provide a valuable tool in the hands of security researchers to discover multi step attacks possible in a computer network. Read more by following the below link: http://www.ivizsecurity.com/blog/web-application-security/5-real-life-applications-of-attack-trees/
Related Articles -
Attack Trees, Penetration Testing, Application Security, Vulnerability Analysis, Intrusion Detection Systems (IDS), Computing Metrics,
|