Asset-Centric Analysis and Visualisation of Attack Trees

Author(s):  
Christopher Schmitz ◽  
André Sekulla ◽  
Sebastian Pape
Keyword(s):  
Author(s):  
Aliyu Tanko Ali ◽  
Damas Gruska
Keyword(s):  

Author(s):  
Ahto Buldas ◽  
Aleksandr Lenin ◽  
Jan Willemson ◽  
Anton Charnamord
Keyword(s):  

Author(s):  
Maxime Audinot ◽  
Sophie Pinchinat
Keyword(s):  

Author(s):  
Yi-Chih Kao ◽  
Yuan-Ping Hwang ◽  
Shih-Chen Wang ◽  
Sheng-Lung Peng
Keyword(s):  

Author(s):  
Olga Gadyatskaya ◽  
Carlo Harpes ◽  
Sjouke Mauw ◽  
Cédric Muller ◽  
Steve Muller
Keyword(s):  

2014 ◽  
pp. 2099-2119
Author(s):  
Punam Bedi ◽  
Vandana Gandotra ◽  
Archana Singhal

This chapter discusses adoption of some proactive strategies in threat management for security of software systems. Security requirements play an important role for secure software systems which arise due to threats to the assets from malicious users. It is therefore imperative to develop realistic and meaningful security requirements. A hybrid technique has been presented in this chapter evolved by overlapping the strengths of misuse cases and attack trees for elicitation of flawless security requirements. This chapter also discusses an innovative technique using fuzzy logic as a proactive step to break the jinx of brittleness of present day security measures based on binary principle. In this mechanism, partially secure state evolved between safe state and failed state using fuzzy logic provides an alert signal to take appropriate additional preventive measures to save the system from entering into the failed state to the extent possible.


2020 ◽  
Vol 88 ◽  
pp. 101630 ◽  
Author(s):  
Ahto Buldas ◽  
Olga Gadyatskaya ◽  
Aleksandr Lenin ◽  
Sjouke Mauw ◽  
Rolando Trujillo-Rasua

Sign in / Sign up

Export Citation Format

Share Document