CHAPTER
7 Forests of Attack Trees
Overview
• 7.1 Attack Trees and Forests
• 7.1.2 Deriving Attack Scenarios
• 7.2 System Failures Predict Cybersecurity Failures
• 7.2.1 Inspirational Catastrophes
• 7.3 Understanding Failure Is the Key to Success: The Five Whys
• 7.4 Forests Should Be Representative, Not Exhaustive
• 7.5 Drive Each Attack Tree Layer by Asking How
• 7.6 Go as Deep as Needed and No Deeper
• 7.7 Beware of External Dependencies
• 7.7.2 Information Dependency
Learning Objectives
• Describe ...
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.