Attack trees provide a representation of possible actions an attacker might take to compromise a system, and the defensive measures that a defender can employ to protect the system. They are an effective dialogue tool between the different stakeholders involved in threat modelling: designers and developers of system provide in–depth details about the attack–surface, security experts identify vulnerabilities and countermeasures, and managers contribute with business–driven priorities and decisions.
In this course, we will explore the key principles, tools, and techniques that enable organizations to model and assess security threats using attack trees. You will learn how to use attack trees to summarize attack scenarios in a graphical way, how to determine which attack scenarios are captured or excluded by an attack tree, how to assess and compare different attack scenarios, and how to incorporate countermeasures in your threat model to prevent specific vulnerabilities.