- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 172字
- 2021-06-10 18:42:29
Fault tree and attack tree differences
The principal difference between an attack tree and a fault tree lies in how you enter and traverse each:
- Fault trees are not based on intelligently planned attacks in which leaves of the tree are entered according to the will of an intelligent entity (though a decision may drive the device or system into a state whereby the leaf is entered)
- Fault trees are traversed based on stochastic processes (failure/fault rates) from each leaf through the dependent, intermediate nodes
- Each fault tree leaf is completely independent (faults occur randomly and independently of each other) of all other leaves of the tree
A fault tree can account for the rate at which an aircraft's braking system may fail naturally, for example.
In the tool SecureITree we described earlier, you may also build fault trees by defining a probability indicator at the leaf nodes of the tree. Within the indicator dialog, enter a probability (for example, 1/100, 1/10,000, and so on) for the leaf node event/action to transpire.
推薦閱讀
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 工業互聯網安全防護與展望
- 網絡安全保障能力研究
- 暗戰亮劍:黑客滲透與防御全程實錄
- 黑客攻防入門秘笈
- Enterprise Cloud Security and Governance
- 安全技術運營:方法與實踐
- 代碼審計:企業級Web代碼安全架構
- Kali Linux Network Scanning Cookbook(Second Edition)
- Testing and Securing Android Studio Applications
- 數據安全與隱私計算(第3版)
- 云原生安全技術實踐指南
- 從實踐中學習Kali Linux滲透測試
- 學電腦安全與病毒防范
- INSTANT Apple Configurator How-to