Difference between revisions of "Attack Tree"
Jump to navigation
Jump to search
(Created page with "Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree stru...") |
|||
(19 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
− | + | <!--Insert here introductory text regarding the term.--> | |
− | == | + | ==Definitions== |
− | < | + | <!-- This section presents all available definitions of the above term.--> |
− | [[Category:DIESIS- | + | === European Project Definitions === |
+ | ==== CIPRNet project ==== | ||
+ | {{quote-ciprnet|"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". {{Schneier99}}}}<br/> | ||
+ | |||
+ | ==== DIESIS project ==== | ||
+ | {{quote-diesis|"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". {{Schneier99}}}} | ||
+ | |||
+ | <!-- | ||
+ | === Other International Definitions === | ||
+ | === National Definitions === | ||
+ | ==== Country Name==== | ||
+ | |||
+ | --> | ||
+ | |||
+ | |||
+ | ===Standard Definition=== | ||
+ | ====[[IETF]]==== | ||
+ | {{definition|A branching, hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specified way.<ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br /> | ||
+ | |||
+ | == Discussion Topic == | ||
+ | See discussion in <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>. | ||
+ | ==See also== | ||
+ | <!-- Add links to related terms --> | ||
+ | |||
+ | |||
+ | ==Notes== | ||
+ | <!-- The references will be automatically be listed below. In order to reference --> | ||
+ | <references /> | ||
+ | |||
+ | ==References== | ||
+ | <!-- Additional references can also be added below.--> | ||
+ | |||
+ | |||
+ | <!-- Add category, i.e. [[Category:Main]] --> | ||
+ | [[Category:CIPRNet-Glossary]][[Category:DIESIS-Glossary]][[Category:Analysis]] | ||
+ | {{#set:defined by=EU project|defined by=IETF}} | ||
+ | {{#set: Showmainpage=Yes}} |
Latest revision as of 23:20, 27 June 2019
Contents
Definitions
European Project Definitions
CIPRNet project
The CIPRNet project [1] uses the following definition:
"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". [2]
DIESIS project
The DIESIS project [3] gives the following definition:
"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". [2]
Standard Definition
IETF
A branching, hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specified way.[4]
Discussion Topic
See discussion in [4].
See also
Notes
- ↑ http://www.ciprnet.eu/
- ↑ 2.0 2.1 Bruce Schneier (1999). Attack Trees. Dr Dobb's Journal, v.24, n.12, December 1999
- ↑ http://www.diesis-project.eu/
- ↑ 4.0 4.1 IETF RFC449 Internet Security Glossary 2
References