Title :
Does appropriate software support for target identification exist?
Author :
Vintr, Zdenek ; Vintr, Michal ; Malach, Jindrich
Author_Institution :
Univ. of Defence, Brno, Czech Republic
Abstract :
The paper deals with the evaluation and the selection of available software tools that can be utilized in solving problems related to the identification of the targets of malicious acts. The paper presents grant project requirements that focus on the development of methods for the target identification in the field of nuclear energy and critical infrastructure in the Czech Republic. The main requirements are related primarily to the modeling of unacceptable effects of malicious acts. Based on the project purposes, the specific requirements for software support for targets identification are defined. In the next step, the available methods and techniques such as event trees, fault trees and attack trees are introduced. After that there is a summary of available software tools focused on modeling and solving event, fault and attack trees. Individual software tools made by reputable producers are characterized in detail. Finally the paper compares the capability of available software tools with the specified requirements.
Keywords :
security of data; software tools; Czech Republic; attack tree; event tree; fault tree; malicious acts target identification; nuclear energy; software support; software tool; Educational institutions; Fault trees; Reliability; Safety; Security; Software tools; Attack Tree; Event Tree; Fault Tree; Threat;
Conference_Titel :
Security Technology (ICCST), 2011 IEEE International Carnahan Conference on
Conference_Location :
Barcelona
Print_ISBN :
978-1-4577-0902-9
DOI :
10.1109/CCST.2011.6095897