SCAN

SCAN

Your website for malware or malicious redirects!

DETECT

DETECT

Any suspicious activity on your website!

ALERT

ALERT

Your website administrator or any specialized company!

KEEP

KEEP

An open, safe and secure cyberspace!

Attack Tree for a Website

The attack tree is a systematic method that characterizes the security of a computer system, based on cyber-attacks. Attack information is redefined, identifying the means of compromising the security of a computer system as the root of the tree. An attack tree consists of a root node and several nodes located on multiple depth levels. The way in which a cyber-attacker can compromise the computer system is iteratively and incrementally represented as the nodes at the base level of the tree. Each attack tree presents methods by which a cyber-attacker can cause an incident. Each path within an attack tree represents a unique attack on the system.

In developing the attack tree for a website, the root of the tree must represent the compromising security of the platform.
The following attack tree is a high-level attack tree for a website:

ROOT Compromise the security of a website
AND 1. Identifying vulnerabilities
             OR 1. Scanning the vulnerabilities of the website
                    2. Analyzing the website activity and identifying the website users
                    3. Developing social engineering attacks on users with access rights
         2. Developing software tools for exploiting vulnerabilities
             OR 1. Developing the tools required for cyber-attack
                    2. Configuring existing attack tools
         3. Simulating cyber-attacks to the website
             OR 1. SQLi (SQL Injection) attack
                    2. Brute Force attack
                    3. XSS (Cross-Site Scripting) attack
                    4. CSRF (Cross-Site Request Forgery) attack
                    5. DoS (Denial of Service) attack
         4. Exploitation of vulnerabilities identified
         5. Injecting scripts on the website
             OR 1. Injecting malicious scripts
                    2. Injecting malware
         6. Controlling the website
             OR 1. Accessing the website administration panel
                    2. Accessing the website database
         7. Creating damages to the website
             OR 1. Retrieving data from the website database
                    2. Modifying the website files
                    3. Using the website for other cyber-attacks