Category Archives: AttackTree+

Fault Tree+ Training – International System Safety Conference

Reliability Workbench FaultTree+

Fault Tree Analysis – Why you do it and what you get from it.

Minimal Cut Sets: Combinations of component failures that cause system failure.

Failure Models: How to put numbers into a Fault Tree, so you can get numbers out.

System Quantification: A brief overview of the calculations used to quantify a Fault Tree.

Best Kept Secret in Isograph’s software

Secret might be the wrong word to use here, it could be a matter of just asking myself or technical support the right questions. Even if you’ve been using Reliability Workbench, Availability Workbench, AttackTree+, or Network Availability Prediction for years, you’re probably still finding new features and tips and tricks to help you out in the software. Maybe one day you discovered a time-saver and thought to your self “what else can this software do to make my day easier?”

While there are plenty of helpful features in Isograph’s software to make your day easier, perhaps none is so powerful, incredibly useful, and so under-utilized as Plugins and the DLL. These features allow you to extend the power of Reliability Workbench, Availability Workbench, Attack Tree, and NAP tools to absurd heights. From creating macros for accomplishing tedious tasks, to automating fault tree construction, and even adding new features to the software that we haven’t even thought about, the Plugins and DLL can do it.

As always if you have any questions or need additional information on our products please feel free to contact me

Jeremy Hynek
Isograph, Inc.
jhynek@isograph.com
801 610 0045

Threat/Attack Analysis

Attack trees allow threats against system security to be modelled concisely in a graphical format. The effectiveness of internet security, network security, banking system security, installation and personnel security may all be modelled using attack trees.

In the following webinar we decided to model a threat example in our AttackTree+ software.  We took an article from www.wired.com where hackers remotely killed a Jeep Cherokee while driving 70 miles per hour on the freeway. Using this article we created an example in our AttackTree+ software.

Note: much of the failure rate data was made up using information available on the internet.