Risk by Configuration and Threat

Risk by Configuration and Threat

A chart showing how the hypothetical Acme web shopping site will fare against two classes of adversary, with and without a particular countermeasure being deployed.

Risk by Configuration and Threat

 

Click to see other screenshots:

Acme Attack Tree
Acme Attack Scenarios
Pruned Attack Tree
Threat Agent Profile
Threat Agent Utility Function
Risk by Configuration and Threat
High Risk Scenarios
Hostile Risk Scatter Graph
Linux Attack Tree
Privileged Process Attack Tree

 


Home Close Window

Copyright © 2024 Amenaza Technologies Limited. All rights reserved.