Assessment of control and monitoring system design security using the attack security tree analysis method
Abstract
Because of the efficiency of the system and the fact that it successfully completed the tasks that were given to it under specific conditions, we are compelled to look for a way to measure these requirements according to the conditions and guidelines that were established by the people who make use of the system. Conduct an investigation into the many techniques that are available for use in analysis in light of the following conditions: i) sufficient time to detect the mistake, ii) time to maintenance, iii) the total number of constituents involved in the analytical process, and iv) an explanation of the level of complexity provided to the user. In this article, we will provide a concise overview of a number of different approaches, along with our recommendations for the most effective ones based on the issues raised earlier.
Keywords
Advanced persistent threat; Attack security tree analysis; Attack tree analysis; Controlling system and observation; Reliability block diagram
Full Text:
PDFDOI: http://doi.org/10.11591/ijeecs.v31.i2.pp820-827
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).