官术网_书友最值得收藏!

Attack trees

It is easy in the security industry to be drawn to the latest and greatest exploits and attack methodologies. We frequently speak of attack vectors and attack surfaces without any real specificity or rigor. If it is specific, it is usually in the form of news reports or publications from security researchers about new zero-days discovered in the wild and how they may have been deployed against a target. In other words, many of our discussions about attack vectors and attack surfaces are simply undisciplined.

It is possible for a single attack on a device or application to yield substantial value to an attacker, either in information compromised, manipulation of the device for physical effect, or opportunities for pivoting elsewhere in the device's network. In practice, however, an attack is usually part of a campaign of grouped and/or sequenced sub-attacks or other activities, each carefully chosen from a variety of intelligence methods (for example, human social engineering, profiling, scanning, internet research, and familiarity with the system). Each activity designed to accomplish its immediate goal has some level of difficulty, cost, and probability of success. Attack trees help us model these characteristics in devices and systems.

Attack trees are conceptual diagrams showing how an asset, or target, might be attacked (https://en.wikipedia.org/wiki/Attack_tree). In other words, when it is time to really understand a system's security posture and not just knee-jerk worry about the latest sensational reported attack vectors du jour, it is time to build an attack tree. An attack tree can help your organization visualize, communicate, and come to a more realistic understanding of the sequence of vulnerability that can be exploited for some end effect.

主站蜘蛛池模板: 蓬莱市| 平阴县| SHOW| 天峨县| 和政县| 堆龙德庆县| 界首市| 万荣县| 前郭尔| 庆城县| 东乡| 郸城县| 涡阳县| 普格县| 五寨县| 海南省| 乌拉特后旗| 额敏县| 潼关县| 东辽县| 噶尔县| 松江区| 武鸣县| 盐城市| 汪清县| 琼结县| 临沭县| 茂名市| 堆龙德庆县| 格尔木市| 新巴尔虎左旗| 忻城县| 自贡市| 聂拉木县| 周至县| 什邡市| 桑植县| 桃源县| 双峰县| 朝阳区| 永年县|