Difference between revisions of "Attack Tree"
Jump to navigation
Jump to search
m (Mtheocharidou moved page Attack tree to Attack Tree: Text replacement - "Attack tree" to "Attack Tree") |
|||
Line 21: | Line 21: | ||
===Standard Definition=== | ===Standard Definition=== | ||
− | + | ====[[IETF]]==== | |
+ | {{definition|A branching, hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specified way.<ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br /> | ||
== Discussion Topic == | == Discussion Topic == | ||
− | < | + | See discussion in <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>. |
− | |||
==See also== | ==See also== | ||
<!-- Add links to related terms --> | <!-- Add links to related terms --> | ||
Line 40: | Line 40: | ||
<!-- Add category, i.e. [[Category:Main]] --> | <!-- Add category, i.e. [[Category:Main]] --> | ||
[[Category:DIESIS-Glossary]][[Category:Analysis]] | [[Category:DIESIS-Glossary]][[Category:Analysis]] | ||
− | {{#set:defined by=EU project}} | + | {{#set:defined by=EU project|defined by=IETF}} |
Revision as of 17:25, 7 February 2016
Contents
Definitions
European Definitions
DIESIS project
The DIESIS project [1] gives the following definition:
"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". [2]
Other International Definitions
National Definitions
Standard Definition
IETF
A branching, hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specified way.[3]
Discussion Topic
See discussion in [3].
See also
Notes
- ↑ http://www.diesis-project.eu/
- ↑ Bruce Schneier (1999). Attack Trees. Dr Dobb's Journal, v.24, n.12, December 1999
- ↑ 3.0 3.1 IETF RFC449 Internet Security Glossary 2