Linux Attack Tree

Linux Attack Tree

A partial attack tree showing ways in which the Linux operating system can be attacked. This tree is part of Amenaza's IT LIbrary of attack trees. Green nodes represent alternative ways in which the node can be realized (OR nodes). Cyan nodes depict processes or procedures for accomplishing the node (AND). The grey rectangles at the bottom of the tree are leaf nodes. Leaf nodes are the points of interaction between the adversary and the target. The pink nodes with a bar underneath have been rolled up - the detail below them is graphically suppressed. The analyst can reveal the hidden information with a few clicks of the mouse.

Linux Attack Tree

 

Click to see other screenshots:

Acme Attack Tree
Acme Attack Scenarios
Pruned Attack Tree
Threat Agent Profile
Threat Agent Utility Function
Risk by Configuration and Threat
High Risk Scenarios
Hostile Risk Scatter Graph
Linux Attack Tree
Privileged Process Attack Tree

 


Home Close Window

Copyright © 2024 Amenaza Technologies Limited. All rights reserved.