Software

Threat Analysis Based on the Graph of Elementary Threats

Download Now Free registration required

Executive Summary

At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a threat tree is created for each single threat. This solution causes a complicated influence analysis of the partial threats that occur in several trees. In this paper, a method for threat analysis is described which enables a complex influence analysis of partial threats and a choice of optimal set of security countermeasures.

  • Format: PDF
  • Size: 121 KB