To search, Click below search items.


All Published Papers Search Service


Threat analysis based on the graph of elementary threats


Karel Burda


Vol. 8  No. 12  pp. 66-68


At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a threat tree is created for each single threat. This solution causes a complicated influence analysis of the partial threats that occur in several trees. In this paper, a method for threat analysis is described which enables a complex influence analysis of partial threats and a choice of optimal set of security countermeasures.


threat analysis, threat tree