Threat/Attack Analysis

Attack trees allow threats against system security to be modelled concisely in a graphical format. The effectiveness of internet security, network security, banking system security, installation and personnel security may all be modelled using attack trees.

In the following webinar we decided to model a threat example in our AttackTree+ software.  We took an article from www.wired.com where hackers remotely killed a Jeep Cherokee while driving 70 miles per hour on the freeway. Using this article we created an example in our AttackTree+ software.

Note: much of the failure rate data was made up using information available on the internet.