To search, Click below search items.

 

All Published Papers Search Service

Title

Threat analysis based on the graph of elementary threats

Author

Karel Burda

Citation

Vol. 8  No. 12  pp. 66-68

Abstract

At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a threat tree is created for each single threat. This solution causes a complicated influence analysis of the partial threats that occur in several trees. In this paper, a method for threat analysis is described which enables a complex influence analysis of partial threats and a choice of optimal set of security countermeasures.

Keywords

threat analysis, threat tree

URL

http://paper.ijcsns.org/07_book/200812/20081210.pdf