This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Using Attack Graphs to Design Systems
July/August 2007 (vol. 5 no. 4)
pp. 80-83
Suvajit Gupta, Cigital
Joel Winstead, Cigital
On a recent project, the authors found informal attack graphs were helpful in the iterative design of a system used to protect sensitive data at a customer site. In this article, they use a snippet from the project's design to illustrate the value of using attack graphs in a secure software development life cycle.
Index Terms:
attack graphs, software development, life cycle, software engineering, agile
Citation:
Suvajit Gupta, Joel Winstead, "Using Attack Graphs to Design Systems," IEEE Security & Privacy, vol. 5, no. 4, pp. 80-83, July-Aug. 2007, doi:10.1109/MSP.2007.100
Usage of this product signifies your acceptance of the Terms of Use.