Security Analysis Game

Story: Suppose you are responsible for security of a system – you could lose your job if too many attacks are successful

Goal: Develop an understanding of security attack trees and how to use them to prevent attacks

How the Game Works: This game uses attack trees to help you understand the weaknesses of network devices against attacks and the type of preventions needed . More

This game uses attack trees to help you understand the weaknesses of network devices against attack and the type of preventions needed. 

some quick facts are:

  • Object is an object in the network that needs to be secured
  • Weakness is a property of the object. It is smallest indivisible unit of a Vulnerability. a weakness may or may not lead to a vulnerability
  • Vulnerability is the state of insecurity. If a vulnerability exists then we can say an attack is possible.
  • Precondition can be a weakness or vulnerability that contributes to another vulnerability.
  • Solution is a policy or an object that addresses a weakness.

Objects to Secure

Here is the list of objects you can analyze using Attack Trees