Attack Paths

In the previous modules, Simulation Results, we looked at the securiCAD example model, run an initial simulation and looked at the risk exposure and Time To Compromise results of the High Value Assets.

In this module we will look at the attack paths leading up to the High Value Assets.

The main use for the attack path maps is for reviewing the different attack steps an attacker is expected to use while moving towards the High Value Assets. In practice, they will help you to understand how an attack is expected to happen and what mitigations that are applicable to limit the risk exposure of a certain target.

What’s Next