ANTI-TAMPER PROCESS TOOLSET
1 Assignment
0 Petitions
Accused Products
Abstract
A tool set is provided that uses a series of modules (e.g. spreadsheet workbooks) for assessing risks/threats to and attacks against a project and developing countermeasures against such risks/threats/attacks. The project may cover a wide berth of functionality from alarm systems, computer security, building projects, etc. The roll up feature of the spreadsheet may be employed to evaluate changing scenarios in a short period of time. Ranked threats and countermeasures operable to defeat such threats may be displayed in a tree diagram generated by one or more of the modules.
-
Citations
11 Claims
-
1-8. -8. (canceled)
-
9. A method of generating a tamper tree diagram comprising:
-
assigning hierarchical indices to individual data elements for computer data records; combining hierarchical indices for each data element in a computer data record into a single mine and sortable composite record index; sorting composite record indices; extracting individual hierarchical indices from sorted composite record indices; determining a hierarchical attack tree stud=from extracted individual hierarchical indices; and replacing hierarchical indices with actual associated data elements.
-
-
10. A system evaluating possible countermeasures against elements of a project comprising:
-
the project; programmable computer useable medium operable to cause said computer to process data records concerning risk, threat, vulnerability impact and security attack, said medium being further operable to cause said computer to apply an algorithm to said data records to rate time-factored risks and select appropriate countermeasures and technical implementations therefor against said time-factored risks, said medium being programmed to cause said computer to generate a tamper tree diagram by assigning hierarchical indices to individual data elements for computer data records;
combining hierarchical indices for each data element in a computer data record into a single unique and sortable composite record index;sorting composite record indices; extracting individual hierarchical indices from sorted composite record indices; do hierarchical attack tree structure from extracted individual hierarchical indices; and replacing hierarchical indices with actual associated data elements.
-
-
11-24. -24. (canceled)
Specification