Technology and Attack Trees

1068 Words3 Pages

The modern technology in the world is growing day by day. So to enable faster and simpler networking, the countries are developing and expanding their technology. Currently there are billions of Internet user and mobile phone connections all over the world. People all around the world are very much depended on consistent access of these channels. Popularity for Internet based networking is growing exponentially, but it come at a cost. The cost is the cyber attack and crimes are increasing rapidly around the world. The attacks like email staking, hacking computers, virus attacks, etc. There was one major cyber attack in year 2000, where around 45 million computer were attacked by the computer virus all around the world[1]. There are different types of cyber attacks. The attacks like Viruses and worms, Trojan, Spam emails, Denial of service, Malware, Phishing etc. Over the past years, the cyber crime scenario has changed as the criminal are using more sophisticated attacks and also they have great knowledge of security. So in order to protect against the attacks, the systems has to be defended. As the defensive measure stationed for attacks are getting better, more sophisticated attacks are being developed by attackers, leading to increasing the complex system. However these complex, large system will poses greater problems. So there has to be some structure to evaluate the security of systems. In 1960s there was fault tree analysis which was developed to evaluate the security of systems[2]. Since the 1990s, various structure were developed, one of the structure was "attack tree".
[4]
The Attack trees are a way to describe the security threats in a hierarchical, graphical model. The attack tree model was proposed by Bruce...

... middle of paper ...

...ks tree can be divided into various stages. By creating some measurable method there is no need for some expert in every single area instead one could have a subject expert who can assist with his inputs.
Shortcomings
Following are the shortcomings. It is easy to ignore the channel of attack as the attack tree gives false sense of security. It is hard to calculate the original cost accurately and the problem is that attack tree results are very much depended on the original cost. Attack tree doesn't consider other factors like in some cases it may be enough to catch the attacker instead of preventing the attack. Breaking down the attack into separate steps, can be difficult for attack tree. Attack tree do not consider the fact that only few people can do a physical breaking as compared to the other attack where anyone in world can attack remotely over the internet.

More about Technology and Attack Trees

Open Document