August 2018
Intermediate to advanced
512 pages
17h 18m
English
• 7.1 Attack Trees and Forests
• 7.1.2 Deriving Attack Scenarios
• 7.2 System Failures Predict Cybersecurity Failures
• 7.2.1 Inspirational Catastrophes
• 7.3 Understanding Failure Is the Key to Success: The Five Whys
• 7.4 Forests Should Be Representative, Not Exhaustive
• 7.5 Drive Each Attack Tree Layer by Asking How
• 7.6 Go as Deep as Needed and No Deeper
• 7.7 Beware of External Dependencies
• 7.7.2 Information Dependency
• Describe ...