Abstract

Attack graphs are used to model system vulnerabilities and their potential exploits. Security metrics serve as a powerful tool for organizations to understand the effectiveness of protecting communications networks. The present paper presents a method for analyzing and assessing cyber security, based on attack graphs. It uses a representation of the relations between vulnerable resources and security incidents produced in networks and allows the quantification of their security level.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call