Difference between revisions of "Attack Tree"
Jump to navigation
Jump to search
(→References) |
(→Definitions) |
||
Line 11: | Line 11: | ||
{{quote-diesis|"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". {{Schneier99}}}} | {{quote-diesis|"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". {{Schneier99}}}} | ||
+ | <!-- | ||
=== Other International Definitions === | === Other International Definitions === | ||
− | |||
− | |||
− | |||
− | |||
=== National Definitions === | === National Definitions === | ||
− | |||
==== Country Name==== | ==== Country Name==== | ||
− | + | ||
+ | --> | ||
+ | |||
===Standard Definition=== | ===Standard Definition=== |
Revision as of 13:40, 22 December 2016
Contents
Definitions
European Project Definitions
CIPRNet project
The CIPRNet project [1] uses the following definition:
"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". [2]
DIESIS project
The DIESIS project [3] gives the following definition:
"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". [2]
Standard Definition
IETF
A branching, hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specified way.[4]
Discussion Topic
See discussion in [4].
See also
Notes
- ↑ http://www.ciprnet.eu/
- ↑ 2.0 2.1 Bruce Schneier (1999). Attack Trees. Dr Dobb's Journal, v.24, n.12, December 1999
- ↑ http://www.diesis-project.eu/
- ↑ 4.0 4.1 IETF RFC449 Internet Security Glossary 2