Vulnerability-based information security risk assessment using attack tree

Yong Wang

Keywords

information security, attack tree, risk assessment, vulnerability

Abstract

In reviewing different security risk assessment methods, we developed a tree-based security assessment model based on vulnerability reports. Using an attack tree in a Unix login account as an example, we analyzed attack trees, resulting in experimental indication that the attack-tree-based risk assessment is more efficient than direct security risk assessment

Important Links:



Go Back