Detail publikace

Threat analysis based on the graph of elementary threats.

BURDA, K.

Originální název

Threat analysis based on the graph of elementary threats.

Typ

článek v časopise - ostatní, Jost

Jazyk

angličtina

Originální abstrakt

At present, an analysis based on the threat tree is used for analysis of threats to information systems. Orientation to a single threat is a characteristic feature of this method. If the analysis is more extensive, then a threat tree is created for each single threat. This solution causes a complicated influence analysis of the partial threats that occur in several trees. In this paper, a method for threat analysis is described which enables a complex influence analysis of partial threats and a choice of optimal set of security countermeasures.

Klíčová slova

threat analysis, elementary threat

Autoři

BURDA, K.

Rok RIV

2008

Vydáno

30. 12. 2008

Nakladatel

IJCSNS

Místo

Seoul, Korea

ISSN

1738-7906

Periodikum

International Journal of Computer Science and Network Security

Ročník

8

Číslo

12

Stát

Korejská republika

Strany od

66

Strany do

68

Strany počet

3

BibTex

@article{BUT47602,
  author="Karel {Burda}",
  title="Threat analysis based on the graph of elementary threats.",
  journal="International Journal of Computer Science and Network Security",
  year="2008",
  volume="8",
  number="12",
  pages="66--68",
  issn="1738-7906"
}