Loading...
「ツール」は右上に移動しました。
利用したサーバー: wtserver1
52いいね 3,012 views回再生

Cybersecurity Risk Assessment (TRA/TARA) – Why to use attack trees, and when to keep away from them?

Attacks trees are a structured and comprehensible way to model attack paths. Yet, using attack trees seems to cause a large effort. Which benefits can be gained from using attack trees for cybersecurity analyses of embedded systems? And when should attack trees better be avoided?


We want to produce videos that cover the topics most interesting to you. So do not hesitate to use the comment function and tell us which topics you would like to be covered.

Get in touch with us:
► Via Website: https://www.itk-engineering.de/expert...
► Via E-Mail: security-projects@itk-engineering.de

You want to know more about the person from the video? Click here to go to the Xing profile: https://www.xing.com/profile/Holger_K...

コメント