The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (2007 vol. 5)
ISSN: 1540-7993
pp: 80-83
Suvajit Gupta , Cigital
Joel Winstead , Cigital
ABSTRACT
On a recent project, the authors found informal attack graphs were helpful in the iterative design of a system used to protect sensitive data at a customer site. In this article, they use a snippet from the project's design to illustrate the value of using attack graphs in a secure software development life cycle.
INDEX TERMS
attack graphs, software development, life cycle, software engineering, agile
CITATION

J. Winstead and S. Gupta, "Using Attack Graphs to Design Systems," in IEEE Security & Privacy, vol. 5, no. , pp. 80-83, 2007.
doi:10.1109/MSP.2007.100
928 ms
(Ver 3.3 (11022016))