Difference between revisions of "Attack Tree"

From CIPedia
Jump to navigation Jump to search
m (Mtheocharidou moved page Attack tree to Attack Tree: Text replacement - "Attack tree" to "Attack Tree")
Line 21: Line 21:
  
 
===Standard Definition===
 
===Standard Definition===
<!--Insert the text of the definition. Each definition should be formatted as a heading level 4, followed by the text of the definition. -->
+
====[[IETF]]====
 +
{{definition|A branching, hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specified way.<ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
  
 
== Discussion Topic ==
 
== Discussion Topic ==
<!-- Discuss topics related to the term, such as closely-related terms, differences among definitions, how to use the definitions provided, open issues, etc. -->
+
See discussion in <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>.
 
 
 
==See also==
 
==See also==
 
<!-- Add links to related terms -->
 
<!-- Add links to related terms -->
Line 40: Line 40:
 
<!-- Add category, i.e. [[Category:Main]] -->
 
<!-- Add category, i.e. [[Category:Main]] -->
 
[[Category:DIESIS-Glossary]][[Category:Analysis]]
 
[[Category:DIESIS-Glossary]][[Category:Analysis]]
{{#set:defined by=EU project}}
+
{{#set:defined by=EU project|defined by=IETF}}

Revision as of 17:25, 7 February 2016


Definitions

European Definitions

DIESIS project

The DIESIS project [1] gives the following definition:

"Attack Trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes". [2]


Other International Definitions

National Definitions

Standard Definition

IETF

A branching, hierarchical data structure that represents a set of potential approaches to achieving an event in which system security is penetrated or compromised in a specified way.[3]


Discussion Topic

See discussion in [3].

See also

Notes

  1. http://www.diesis-project.eu/
  2. Bruce Schneier (1999). Attack Trees. Dr Dobb's Journal, v.24, n.12, December 1999
  3. 3.0 3.1 IETF RFC449 Internet Security Glossary 2

References