Assessment of control and monitoring system design security using the attack security tree analysis method

Mustafa Qahtan Alsudani, Israa Fayez Yousif, Ahmed Nooruldeen Alsafi, Hassan Falah Fakhruldeen


Because of the efficiency of the system and the fact that it successfully completed the tasks that were given to it under specific conditions, we are compelled to look for a way to measure these requirements according to the conditions and guidelines that were established by the people who make use of the system. Conduct an investigation into the many techniques that are available for use in analysis in light of the following conditions: i) sufficient time to detect the mistake, ii) time to maintenance, iii) the total number of constituents involved in the analytical process, and iv) an explanation of the level of complexity provided to the user. In this article, we will provide a concise overview of a number of different approaches, along with our recommendations for the most effective ones based on the issues raised earlier.


Advanced persistent threat; Attack security tree analysis; Attack tree analysis; Controlling system and observation; Reliability block diagram

Full Text:




  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).

shopify stats IJEECS visitor statistics