all InfoSec news
Risk Assessment Graphs: Utilizing Attack Graphs for Risk Assessment. (arXiv:2307.14114v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
Risk assessment plays a crucial role in ensuring the security and resilience
of modern computer systems. Existing methods for conducting risk assessments
often suffer from tedious and time-consuming processes, making it challenging
to maintain a comprehensive overview of potential security issues. In this
paper, we propose a novel approach that leverages attack graphs to enhance the
efficiency and effectiveness of risk assessment. Attack graphs visually
represent the various attack paths that adversaries can exploit within a
system, enabling a systematic …
assessment assessments attack computer consuming graphs making novel processes resilience risk risk assessment risk assessments role security security issues systems