首页>
外国专利>
Threat Model Chaining and Attack Simulation Systems and Related Methods
Threat Model Chaining and Attack Simulation Systems and Related Methods
展开▼
机译:威胁模型链接和攻击模拟系统及相关方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
Threat model chaining methods include providing one or more databases including a threat model components, threats, each threat associated with at least one of the threat model components, and compensating controls, each compensating control associate with one of the threats, providing a diagram interface configured to display a relational diagram defining a first threat model, and configuring the diagram interface to add a component group to the first threat model include in it a second threat model. Attack simulation methods include providing the one or more databases and diagram interface and configuring the diagram interface to visually display attack paths of threats associated with diagrammed threat model components which compromise a selected threat model component. Attack simulation systems include one or more computing devices coupled with one or more databases configured to store and interrelate threats, threat model components, and compensating controls, and allow diagramming and defining of threat models.
展开▼