Security Basics mailing list archives
Attack Trees
From: Gulsher Bajwa <gulsher_bajwa () yahoo com>
Date: Wed, 3 Mar 2004 07:41:04 -0800 (PST)
Hi. Has anyone here used attack trees as a means to assess security? I am currently doing a project as part of my masters program at UB. The objective is to arrive at the security model that is based on sound metrics. Another issue is how does one validate the data that is fed into a model? I have looked at a tool called SecurTree that essentially constructs attack trees. The company that designed the tool blatantly states that the values they assign to the inputs are emperically established. That doesn't say too much in terms of validation. Also, is there any way to profile an attacker? The objective is to conduct a capability analysis of threat agents. I am sorry if the above sounds vague. I am fairly new to Security modeling. Any guidance will be much appreciated. Regards, Gulsher __________________________________ Do you Yahoo!? Yahoo! Search - Find what youre looking for faster http://search.yahoo.com --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.securityfocus.com/sponsor/InfoSecInstitute_security-basics_040303 ----------------------------------------------------------------------------
Current thread:
- Attack Trees Gulsher Bajwa (Mar 03)
- RE: Attack Trees Yvan Boily (Mar 03)