Risk by Configuration and Threat
Risk by Configuration and Threat
A chart showing how the hypothetical Acme web shopping site will fare against two
classes of adversary, with and without a particular countermeasure being deployed.
Click to see other screenshots:
Acme Attack Tree
Acme Attack Scenarios
Pruned Attack Tree
Threat Agent Profile
Threat Agent Utility Function
Risk by Configuration and Threat
High Risk Scenarios
Hostile Risk Scatter Graph
Linux Attack Tree
Privileged Process Attack Tree
Home
Close Window
Copyright © 2024 Amenaza Technologies Limited. All rights
reserved.