If you are a security professional, the chances are that you have encountered an attack tree. Attack trees are primarily used in vulnerability assessment to help find vulnerabilities and prioritize them for remediation. However, before we get into how to use one of these powerful tools, it is important to understand what they are and when they should be utilized. In this blog post, I will discuss how attack trees work and provide examples of the types of questions that can be answered by using one during a vulnerability assessment. – What is an Attack Tree? An attack tree is a diagram that is used to visually organize and show the steps required in order to exploit a vulnerability. It can be helpful during assessments because it allows you to see how one threat or vulnerability could affect another asset, system, application, etc., which helps prioritize what needs attention first. During my time as a security professional I have found myself using various types of attack trees for different purposes: o A Use Case Tree was utilized when defining requirements from stakeholders on how they would like their website tested. This type of tree includes only branches that are related directly to fulfilling stakeholder requirements (e.g., designing tests). o A decision tree uses branching logic – with associated

Related Posts

Leave a Comment