Загрузка страницы

Attack Tree & Threat Analysis Demo

Model system vulnerability, identify weakspots and improve security using threat analysis and attack trees. Construct graphical representations of measures designed to reduce the consequences of a successful attack with mitigation trees.
Analyze threats according to standards such as ISO 26262, ISO/SAE 21434, J3061, DO-356 and ED-203

Identify where your system is vulnerable to an attack

Improve the security of your assets and IT systems
Model consequence mitigation
Build models quickly using the advanced GUI features of AttackTree
Threat analysis is a process by which potential threats to safety, data protection, operations, finances etc. are identified, quantified and prioritized. The purpose of modeling threats is to provide defenders with a systematic analysis of the most likely attack scenarios on an organization’s assets. Potential threats may be ranked by determining an associated risk level that combines the probability of an attack with the severity of the consequences resulting from a successful attack.

Threat analyses are often performed in conjunction with attack tree and mitigation tree analysis. The threat analysis identifies critical threats and attack trees may be used to analyze these threats in more detail. Mitigation trees may then be used to further define the consequence of these threats taking into account various mitigation measures.

Видео Attack Tree & Threat Analysis Demo канала IsographSoftware
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
17 июня 2021 г. 18:24:22
00:24:03
Яндекс.Метрика