Security Basics mailing list archives

RE: Any security attack state model


From: "Cronican, John" <JCronican () sempra com>
Date: Mon, 11 Jul 2005 15:39:06 -0700

Google  "Attack Tree"
http://www.schneier.com/paper-attacktrees-ddj-ft.html
You will find some fine work such as this one "Modeling Security
Threats" By Bruce Schneier
J

John G. Cronican, Jr. (BEE, MSSM, CISSP, IAM)
Sr. Infrastructure Technologist
iProtect Sempra Energy
Sempra Energy Corporate Center & Sempra Energy Utilities
10949 Technology Place
San Diego, CA  92127
(858) 613-5738 (Desk)
(619) 787-1906 (Cell)
(619) 978-2493 (Pager)
 
JCronican () sempra com


-----Original Message-----
From: ricci [mailto:ricci () cs ust hk] 
Sent: Wednesday, July 06, 2005 9:55 PM
To: 'security-basics'
Subject: Any security attack state model
Importance: High


Hello All,

I have been working on IT security attack methodology. Is there any
security attack methodology and category information that has been
adopted by IT market?

Besides, as I thought through security attack methodology, there should
be some step by step attack states. That is, after port scanning, you
will be able to attack web, etc. Is there any methodology or good
reference document?

Please advise.

Thx.

Ricci


Current thread: