Attack Tree – Threat Analysis software – Webinar

Brett Petersen

Isograph’s AttackTree software provides a powerful and user-friendly environment to construct and analyze attack trees.  It gives the user a method to model the threats against a system in a graphical, easy-to-understand manner.  The effectiveness of internet security, network security, banking systems security, installation and personnel security may all be modeled using Attack Tree.

Fault Tree+ Training – International System Safety Conference

Brett Petersen

Reliability Workbench FaultTree+

Fault Tree Analysis – Why you do it and what you get from it.

Minimal Cut Sets: Combinations of component failures that cause system failure.

Failure Models: How to put numbers into a Fault Tree, so you can get numbers out.

System Quantification: A brief overview of the calculations used to quantify a Fault Tree.

Attack Tree Analysis Understanding and modelling threats

Jeremy Hynek

In today’s increasingly interconnected world, system hazards are more likely than ever to originate from deliberate attacks, such as hacking and malware.

Using the example of how an attacker could gain access to on-board systems in a car by hacking into the entertainment system, this webinar will show how attack tree analysis, a modified form of fault tree analysis, can be used to predict the frequency of a threat due to attacks on a system and the failure of defensive measures.

We will also demonstrate how attack tree analysis can take into account the impact of a successful attack on factors such as cost and safety, as well as the cost and difficulty incurred by the attacker.

Included is a web demonstration where we will address modelling these threats in AttackTree+:

As always please feel free to contact me if you have any questions.

Best Regards, Jeremy

Best Kept Secret in Isograph’s software

Jeremy Hynek

Secret might be the wrong word to use here, it could be a matter of just asking myself or technical support the right questions. Even if you’ve been using Reliability Workbench, Availability Workbench, AttackTree+, or Network Availability Prediction for years, you’re probably still finding new features and tips and tricks to help you out in the software. Maybe one day you discovered a time-saver and thought to your self “what else can this software do to make my day easier?”

While there are plenty of helpful features in Isograph’s software to make your day easier, perhaps none is so powerful, incredibly useful, and so under-utilized as Plugins and the DLL. These features allow you to extend the power of Reliability Workbench, Availability Workbench, Attack Tree, and NAP tools to absurd heights. From creating macros for accomplishing tedious tasks, to automating fault tree construction, and even adding new features to the software that we haven’t even thought about, the Plugins and DLL can do it.

As always if you have any questions or need additional information on our products please feel free to contact me

Jeremy Hynek
Isograph, Inc.
801 610 0045

Threat/Attack Analysis

Jeremy Hynek

Attack trees allow threats against system security to be modelled concisely in a graphical format. The effectiveness of internet security, network security, banking system security, installation and personnel security may all be modelled using attack trees.

In the following webinar we decided to model a threat example in our AttackTree+ software.  We took an article from where hackers remotely killed a Jeep Cherokee while driving 70 miles per hour on the freeway. Using this article we created an example in our AttackTree+ software.

Note: much of the failure rate data was made up using information available on the internet.