Hints:

This screen lists a few common security options that are applied to an object.  The attack trees can be analyzed and simple ‘what if’ games can be played to better understand security risks (click on for more information).

Tree Analysis Through Game Playing

  

Your Settings
Device is placed in a secure location  No   Yes  
Authorization is required for access  No   Yes  
Effective workload to avoid jamming  No   Yes  
Firewall has sufficient Authentication  No   Yes  
Firewall has sufficient Authorization  No   Yes  
Firewall has sufficient Audit trails  No   Yes  
More Hints:

You can select the security settings for your object here. please specify from listed settings which of these are applied and click on ‘Submit’ to see how the settings enable/disable some attacks. It will be seen that, in some cases, ignoring one security setting (for example, not putting password) can enable many different types of attacks.