Difference between revisions of "Attack Tree"

From CIPedia
Jump to navigation Jump to search
(Created page with "Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree stru...")
 
 
(19 intermediate revisions by 3 users not shown)
Line 1: Line 1:
Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes <ref name="Schneier1999"> Bruce Schneier (1999). Attack Trees. Dr Dobb's Journal, v.24, n.12, December 1999</ref>.
+
<!--Insert here introductory text regarding the term.-->
  
==Literature==
+
==Definitions==
<references/>
+
<!-- This section presents all available definitions of the above term.-->
  
[[Category:DIESIS-Glossary‏‎]]
+
=== European Project Definitions ===
 +
==== CIPRNet project ====
 +
{{quote-ciprnet|"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". {{Schneier99}}}}<br/>
 +
 
 +
==== DIESIS project ====
 +
{{quote-diesis|"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". {{Schneier99}}}}
 +
 
 +
<!--
 +
=== Other International Definitions ===
 +
=== National Definitions ===
 +
==== Country Name====
 +
 
 +
-->
 +
 
 +
 
 +
===Standard Definition===
 +
====[[IETF]]====
 +
{{definition|A branching, hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specified way.<ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
 +
 
 +
== Discussion Topic ==
 +
See discussion in <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>.
 +
==See also==
 +
<!-- Add links to related terms -->
 +
 
 +
 
 +
==Notes==
 +
<!-- The references will be automatically be listed below. In order to reference  -->
 +
<references />
 +
 
 +
==References==
 +
<!-- Additional references can also be added below.-->
 +
 
 +
 
 +
<!-- Add category, i.e. [[Category:Main]] -->
 +
[[Category:CIPRNet-Glossary]][[Category:DIESIS-Glossary]][[Category:Analysis]]
 +
{{#set:defined by=EU project|defined by=IETF}}
 +
{{#set: Showmainpage=Yes}}

Latest revision as of 23:20, 27 June 2019


Definitions

European Project Definitions

CIPRNet project

The CIPRNet project [1] uses the following definition:

"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". [2]


DIESIS project

The DIESIS project [3] gives the following definition:

"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". [2]



Standard Definition

IETF

A branching, hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specified way.[4]


Discussion Topic

See discussion in [4].

See also

Notes

  1. http://www.ciprnet.eu/
  2. 2.0 2.1 Bruce Schneier (1999). Attack Trees. Dr Dobb's Journal, v.24, n.12, December 1999
  3. http://www.diesis-project.eu/
  4. 4.0 4.1 IETF RFC449 Internet Security Glossary 2

References