Documents
Dr Edward Amoroso, leader of the elite advisory group TAG Cyber, tells why system level threat modeling using SecurITree is vital. Read about the advantages of system level threat modeling.
-
Advantages of System
Level Threat Modeling
(PDF - 5 pages, 76 KB)
Analyst Report: Advantages of System Level Threat Modeling
-
TAG Cyber Security Annual
2023
(PDF - 16 pages, 616 KB)
Comprehensive Threat Analysis and Risk Assessment Solutions
-
Attack Tree-based Threat Risk Analysis
(PDF - 40 pages, 704 KB)
A comprehensive discussion of the fundamentals of attack tree analysis and how to build attack trees.
-
Attack Defense Trees
(PDF - 5 pages, 139 KB)
An introduction to the attack defense tree functionality in SecurITree.
-
Probability and Attack Trees
(PDF - 6 pages, 467 KB)
How SecurITree Deals with Random Events
-
SecurITree User Manual - pdf version
(PDF - 449 pages, 2.39 MB)
-
Amenaza Pamphlet
(PDF - 2 pages)
Attack tree-based Threat Risk Analysis pamphlet.
-
SC Magazine Review November 2009
(PDF - 1 page)
Review of SecurITree from the November 2009 issue of SC Magazine.
Technology Editor Peter Stephenson picks the products that have made the most significant impact over the past two decades.
-
SC Magazine Review February 2007
(PDF - 1 page)
Review of SecurITree from the February 2007 issue of SC Magazine.
-
Hostile
Risk Decisions and Capabilities-based Analysis
(PDF - 3 pages)
Amenaza Technologies' capabilities-based attack tree analysis provides an objective way to improve decision making on issues related to hostile risk.
For older documents, please visit the archives.
Many of the documents listed here require Adobe Acrobat Reader. Get Adobe Acrobat Reader here.