Publication detail

Threat analysis based on the graph of elementary threats.

BURDA, K.

Original Title

Threat analysis based on the graph of elementary threats.

English Title

Threat analysis based on the graph of elementary threats.

Type

journal article - other

Language

en

Original Abstract

At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a threat tree is created for each single threat. This solution causes a complicated influence analysis of the partial threats that occur in several trees. In this paper, a method for threat analysis is described which enables a complex influence analysis of partial threats and a choice of optimal set of security countermeasures.

English abstract

At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a threat tree is created for each single threat. This solution causes a complicated influence analysis of the partial threats that occur in several trees. In this paper, a method for threat analysis is described which enables a complex influence analysis of partial threats and a choice of optimal set of security countermeasures.

Keywords

threat analysis, elementary threat

RIV year

2008

Released

30.12.2008

Publisher

IJCSNS

Location

Seoul, Korea

Pages from

66

Pages to

68

Pages count

3

BibTex


@article{BUT47602,
  author="Karel {Burda}",
  title="Threat analysis based on the graph of elementary threats.",
  annote="At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a threat tree is created for each single threat. This solution causes a complicated influence analysis of the partial threats that occur in several trees. In this paper, a method for threat analysis is described which enables a complex influence analysis of partial threats and a choice of optimal set of security countermeasures.",
  address="IJCSNS",
  chapter="47602",
  institution="IJCSNS",
  journal="International Journal of Computer Science and Network Security",
  number="12",
  volume="8",
  year="2008",
  month="december",
  pages="66--68",
  publisher="IJCSNS",
  type="journal article - other"
}