In today’s increasingly interconnected world, system hazards are more likely than ever to originate from deliberate attacks, such as hacking and malware.
Using the example of how an attacker could gain access to on-board systems in a car by hacking into the entertainment system, this webinar will show how attack tree analysis, a modified form of fault tree analysis, can be used to predict the frequency of a threat due to attacks on a system and the failure of defensive measures.
We will also demonstrate how attack tree analysis can take into account the impact of a successful attack on factors such as cost and safety, as well as the cost and difficulty incurred by the attacker.
Included is a web demonstration where we will address modelling these threats in AttackTree+:
As always please feel free to contact me if you have any questions.
Secret might be the wrong word to use here, it could be a matter of just asking myself or technical support the right questions. Even if you’ve been using Reliability Workbench, Availability Workbench, AttackTree+, or Network Availability Prediction for years, you’re probably still finding new features and tips and tricks to help you out in the software. Maybe one day you discovered a time-saver and thought to your self “what else can this software do to make my day easier?”
While there are plenty of helpful features in Isograph’s software to make your day easier, perhaps none is so powerful, incredibly useful, and so under-utilized as Plugins and the DLL. These features allow you to extend the power of Reliability Workbench, Availability Workbench, Attack Tree, and NAP tools to absurd heights. From creating macros for accomplishing tedious tasks, to automating fault tree construction, and even adding new features to the software that we haven’t even thought about, the Plugins and DLL can do it.
As always if you have any questions or need additional information on our products please feel free to contact me
801 610 0045
Attack trees allow threats against system security to be modelled concisely in a graphical format. The effectiveness of internet security, network security, banking system security, installation and personnel security may all be modelled using attack trees.
In the following webinar we decided to model a threat example in our AttackTree+ software. We took an article from www.wired.com where hackers remotely killed a Jeep Cherokee while driving 70 miles per hour on the freeway. Using this article we created an example in our AttackTree+ software.
Note: much of the failure rate data was made up using information available on the internet.