Matches in DBpedia 2014 for { <http://dbpedia.org/resource/Attack_tree> ?p ?o. }
Showing items 1 to 17 of
17
with 100 items per page.
- Attack_tree abstract "Attack trees are conceptual diagrams showing how an asset, or target, might be attacked. Attack trees have been used in a variety of applications. In the field of information technology, they have been used to describe threats on computer systems and possible attacks to realize those threats. However, their use is not restricted to the analysis of conventional information systems. They are widely used in the fields of defense and aerospace for the analysis of threats against tamper resistant electronics systems (e.g., avionics on military aircraft). Attack trees are increasingly being applied to computer control systems (especially relating to the electric power grid ). Attack trees have also been used to understand threats to physical systems.Some of the earliest descriptions of attack trees are found in papers and articles by Bruce Schneier, CTO of Counterpane Internet Security. Schneier was clearly involved in the development of attack tree concepts and was instrumental in publicizing them. However, the attributions in some of the early publicly available papers on attack trees also suggest the involvement of the National Security Agency in the initial development.Attack trees are very similar, if not identical, to threat trees. Threat trees were discussed in 1994 by Edward Amoroso.".
- Attack_tree thumbnail Attack_tree_virus.png?width=300.
- Attack_tree wikiPageExternalLink index.php?title=Main_Page.
- Attack_tree wikiPageExternalLink www.amenaza.com.
- Attack_tree wikiPageExternalLink attacktree.
- Attack_tree wikiPageID "4339301".
- Attack_tree wikiPageRevisionID "600754533".
- Attack_tree hasPhotoCollection Attack_tree.
- Attack_tree subject Category:Computer_network_security.
- Attack_tree comment "Attack trees are conceptual diagrams showing how an asset, or target, might be attacked. Attack trees have been used in a variety of applications. In the field of information technology, they have been used to describe threats on computer systems and possible attacks to realize those threats. However, their use is not restricted to the analysis of conventional information systems.".
- Attack_tree label "Attack tree".
- Attack_tree sameAs m.0bxyvw.
- Attack_tree sameAs Q4818024.
- Attack_tree sameAs Q4818024.
- Attack_tree wasDerivedFrom Attack_tree?oldid=600754533.
- Attack_tree depiction Attack_tree_virus.png.
- Attack_tree isPrimaryTopicOf Attack_tree.