Hints:

This screen lists a few common security options that are applied to an object.  The attack trees can be analyzed and simple ‘what if’ games can be played to better understand security risks (click on for more information).

Tree Analysis Through Game Playing

  

Your Settings
Restricted access to root password/ID  No   Yes  
Updates and patches applied to reduce weaknesses in OS  No   Yes  
Strong Password  No   Yes  
Malicious Software programs prevented  No   Yes  
Inherent Weaknesses/Bugs in installed programs are taken care of  No   Yes  
More Hints:

You can select the security settings for your object here. please specify from listed settings which of these are applied and click on ‘Submit’ to see how the settings enable/disable some attacks. It will be seen that, in some cases, ignoring one security setting (for example, not putting password) can enable many different types of attacks.