Attack Tree Analysis Understanding and modelling threats

In today’s increasingly interconnected world, system hazards are more likely than ever to originate from deliberate attacks, such as hacking and malware.

Using the example of how an attacker could gain access to on-board systems in a car by hacking into the entertainment system, this webinar will show how attack tree analysis, a modified form of fault tree analysis, can be used to predict the frequency of a threat due to attacks on a system and the failure of defensive measures.

We will also demonstrate how attack tree analysis can take into account the impact of a successful attack on factors such as cost and safety, as well as the cost and difficulty incurred by the attacker.

Included is a web demonstration where we will address modelling these threats in AttackTree+:

As always please feel free to contact me if you have any questions.

Best Regards, Jeremy

Building a fault tree from a schemtic

Included is our most popular webinar to date, where we will took the included schematic, of a propulsion system, and demonstrated the logic used to represent this schematic in a Fault Tree. Although there is more than one way to skin a cat, our Fault Tree expert created what he sees as the most logical model to represent this system.

For the ambitious I would suggest that you build your own model in FaultTree+ prior to viewing the meeting and see how your model matches up with ours. For those using demonstration versions of the software you can build the model and save the image using “Print Screen”.

**HINT** in this example, the Fault Tree will look much simpler than the schematic. Watch for common cause failures.

Monopropellant propulsion2 (2)

Please let me know if you have any questions about this Webinar, it will be well worth your time. As always this is not a sales focused web meeting it will be an educational webinar focused on the technical aspects of building a Fault Tree.

 

Best Regards, Jeremy

jhynek@isograph.com