Acme Attack Tree

Acme Attack Tree

An attack tree showing ways an attacker could compromise the web server of a hypothetical Internet shopping site (Acme). Green nodes represent alternative ways in which the node can be realized (OR nodes). Cyan nodes depict processes or procedures for accomplishing the node (AND). The grey rectangles at the bottom of the tree are leaf nodes. Leaf nodes are the points of interaction between the adversary and the target. The pink nodes with a bar underneath have been rolled up - the detail below them is graphically suppressed. The analyst can reveal the hidden information with a few clicks of the mouse.

Acme Attack Tree

 

Click to see other screenshots:

Acme Attack Scenarios
Pruned Attack Tree
Threat Agent Profile
Threat Agent Utility Function
Risk by Configuration and Threat
High Risk Scenarios
Hostile Risk Scatter Graph
Linux Attack Tree
Privileged Process Attack Tree

 


Home Close Window

Copyright © 2024 Amenaza Technologies Limited. All rights reserved.