- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 279字
- 2021-06-10 18:42:28
Attack trees
It is easy in the security industry to be drawn to the latest and greatest exploits and attack methodologies. We frequently speak of attack vectors and attack surfaces without any real specificity or rigor. If it is specific, it is usually in the form of news reports or publications from security researchers about new zero-days discovered in the wild and how they may have been deployed against a target. In other words, many of our discussions about attack vectors and attack surfaces are simply undisciplined.
It is possible for a single attack on a device or application to yield substantial value to an attacker, either in information compromised, manipulation of the device for physical effect, or opportunities for pivoting elsewhere in the device's network. In practice, however, an attack is usually part of a campaign of grouped and/or sequenced sub-attacks or other activities, each carefully chosen from a variety of intelligence methods (for example, human social engineering, profiling, scanning, internet research, and familiarity with the system). Each activity designed to accomplish its immediate goal has some level of difficulty, cost, and probability of success. Attack trees help us model these characteristics in devices and systems.
Attack trees are conceptual diagrams showing how an asset, or target, might be attacked (https://en.wikipedia.org/wiki/Attack_tree). In other words, when it is time to really understand a system's security posture and not just knee-jerk worry about the latest sensational reported attack vectors du jour, it is time to build an attack tree. An attack tree can help your organization visualize, communicate, and come to a more realistic understanding of the sequence of vulnerability that can be exploited for some end effect.
- 數據恢復方法及案例分析
- 計算機網絡安全技術(第6版·慕課版)
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 白帽子講Web安全(紀念版)
- 網絡安全意識導論
- Learning Veeam? Backup & Replication for VMware vSphere
- Python Penetration Testing Cookbook
- Instant Java Password and Authentication Security
- 網絡安全與攻防入門很輕松(實戰超值版)
- 黑客攻防從入門到精通
- Kali Linux高級滲透測試(原書第4版)
- 網絡空間安全:拒絕服務攻擊檢測與防御
- Cybersecurity Threats,Malware Trends,and Strategies
- 網絡空間安全導論
- 紅藍攻防:技術與策略(原書第3版)