2015 IEEE 19th International Enterprise Distributed Object Computing Workshop 2015
DOI: 10.1109/edocw.2015.40
|View full text |Cite
|
Sign up to set email alerts
|

Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 38 publications
(34 citation statements)
references
References 20 publications
0
31
0
1
Order By: Relevance
“…Hitherto, we have united the approaches of attack graphs and system modeling in our previous works like P2CySeMoL (Holm et al 2015) and securiCAD (Ekstedt et al 2015). Our central idea was to automatically generate probabilistic attack graphs based on a existing system specification.…”
Section: State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…Hitherto, we have united the approaches of attack graphs and system modeling in our previous works like P2CySeMoL (Holm et al 2015) and securiCAD (Ekstedt et al 2015). Our central idea was to automatically generate probabilistic attack graphs based on a existing system specification.…”
Section: State Of the Artmentioning
confidence: 99%
“…Last, the collected information needs to be processed to detect all weaknesses that can be exploited. To address this, the use of attack simulations based on system architecture models have been proposed (e.g., Ekstedt et al 2015;Holm et al 2015). These approaches take a model of the system and simulate cyber-attacks to identify weaknesses.…”
Section: Introductionmentioning
confidence: 99%
“…The approaches of attack graphs and system modeling are united in our previous works: e.g., P2CySeMoL [8], and securiCAD [7]. The central idea of these works is to automatically generate probabilistic attack graphs from a given system specification.…”
Section: Related Workmentioning
confidence: 99%
“…Hitherto, we have proposed the use of attack simulations based on system architecture models (e.g., [7], [8]) to support these challenging tasks. Our approaches facilitate a model of the system and simulate cyber-attacks in order to identify the greatest weaknesses.…”
Section: Introductionmentioning
confidence: 99%
“…With that in mind, a tool was used for the design of the reference architecture model and the subsequent cyber security analysis. There are several tools proposed in the literature for the security analysis of cyber-physical systems, such as CyberSAGE (Vu et al 2014), as well as commercial tools such as Skybox (Corp 2018) and RedSeal (Inc 2018), and securi-CAD (foreseeti 2018; Ekstedt et al 2015). Commercial tools are more generic, i.e.…”
Section: Reference Model Language and Cyber Security Analysis Toolmentioning
confidence: 99%