Introduction
- Attack trees allow threats against system security to be modelled concisely in a graphical format to create a security risk assessment.
- It follows Fault Tree methodology to do risk assessment.
Key Features
- Easily evaluation of threats causing security problems can be solved using attack tree.
- Easy identification of the threats and the process they break the barriers.
- A ‘Mitigation Tree’ module to model the effects of mitigation factors on consequences
- Multiple Import and export options are available.
- Customizable report designer for the easy report creation.
Benefits
- The minimal cut sets, the probability of the events, consequences, and barriers can be easily evaluated.
- The complex security systems can also be easily designed and evaluated using Attack Tree.
- It is possible to ‘prune’ the attack tree to easily identify the route by which attack would succeed.
- User friendly and easy access to the attack tree.
- Flexible Grid layouts and best graphical design can be seen.
- Very useful reports can be easily created.