Pruned Attack Tree

Pruned Attack Tree

Each attack scenario in an attack tree requires resources and skills from the attacker. If the attack is beyond the capabilities of a particular class of adversary (threat agent) they will be unable to perform it. In this figure the analyst has defined the characteristics of a threat agent - a well funded, moderately skilled organized crime group. The limitations of the adversary have caused the portions of the tree beyond their capability to be removed from the diagram.

Pruned Attack Tree

 

Click to see other screenshots:

Acme Attack Tree
Acme Attack Scenarios
Pruned Attack Tree
Threat Agent Profile
Threat Agent Utility Function
Risk by Configuration and Threat
High Risk Scenarios
Hostile Risk Scatter Graph
Linux Attack Tree
Privileged Process Attack Tree

 


Home Close Window

Copyright © 2024 Amenaza Technologies Limited. All rights reserved.