Identify different ways in which an individual or team could mount an attack on a system, and evaluate the levels of defense against different types of attack.
Construct a graphical representation of how attacks might succeed and perform a probabilistic analysis of which attacks are most likely to succeed.
Assess the vulnerability of your system under specified constraints such as costs or required equipment.
Define indicators that quantify things like the cost of an attack or the operational difficulty in mounting an attack.
Assign different categories and levels of consequence to nodes in the attack tree diagram.
Create reports to view all combinations of events that will lead to a successful attack, ranked in the probability of success
Talk to us about how we can help you manage risk. We're ready to help.Contact Us