AttackTree - Threat Analysis Software
AttackTree provides the functionality to model threats to your system using threat analysis (J3061 and ISO-26262) and attack trees. In addition mitigation trees allow you to construct graphical representations of measures designed to reduce the consequences of a successful attack.
-
Most popular related searches
Threat Modeling using Attack Trees
Attack trees allow threats against system security to be modeled concisely in a graphical format to create a security risk assessment. The effectiveness of cyber security, network security, banking system security, automotive cybersecurity, installation and personnel security may all be modeled using attack trees.
With the increased risk of terrorist attacks on homeland security, hacking attacks on computer systems and computer-based fraud on banking systems, the AttackTree security analyzer is an invaluable tool to system designers and security personnel for security assessment.
AttackTree provides a method to model and report the threats against a system in a graphical easy-to-understand manner. If we understand the ways in which a system can be attacked, we can develop countermeasures to prevent those attacks achieving their goal.
In order for an attack to succeed, the attack has to be initiated and various barriers overcome by the attacker. There may be different ways in which an individual or team could mount an attack on a system and there may be different levels of defense against different types of attack.
Attack trees provide a graphical representation of how attacks might succeed and allow a probabilistic analysis of which attacks are most likely to succeed. The methodology can also reveal the vulnerability of your system, under specified constraints. For example, what are the most probable ways in which an attack will succeed in its objective at a relatively low cost to the attacker?
Threat Modeling with AttackTree
AttackTree provides the framework for threat modeling, performing threat analysis and risk assessment according to well known standards such as J3061 and ISO-26262. Users may also customize the analysis using their own consequence categories and severity weightings, likelihood categories and risk levels.
Modeling Threat Mitigation with AttackTree
AttackTree may also be used to model the effect of mitigating measures designed to reduce the consequences of a successful attack. Mitigating measures might include procedures for reducing the effects of data breaches, implementing a timely public relations plan or a providing a rapid emergency response. Mitigating measures may be graphically represented in AttackTree using mitigation trees.
Windows 10 Compatibility
Isograph’s AttackTree has been tested and verified as compatible with 64-bit Windows 10 with Internet Explorer 11/Edge and is supported on the Current Branch, Current Branch for Business and the Long Term Servicing Branch
Customer reviews
No reviews were found for AttackTree - Threat Analysis Software. Be the first to review!