• icon
  • medini analyze Cybersecurity Manual
  • forward
Contents
closeexpand
Print page
Expand/Collapse all
1. Introduction
1.1. Cybersecurity Perspective
2. Context Definition
2.1. Asset Identification
2.2. Security Attributes
2.3. Stakeholder Modeling
2.4. Vulnerability Analysis
3. Damage Scenarios
4. Threat Identification
5. Attacks and Attack Trees
5.1. Attack Tree Modeling
5.2. Attack Path Calculation
6. Risk Assessment
6.1. Risk Graph
6.1.1. HEAVENS Threat Level Parameters
6.1.2. HEAVENS Impact Level Parameters
6.1.3. HEAVENS Security / Risk Level
7. Risk Treatment
7.1. Security Measures
7.2. Security Goals and Security Requirements
8. Vulnerability Analysis
9. Configuration
9.1. Cybersecurity Project Settings
9.2. Cybersecurity Workspace Preferences
A. References
 
 Chapter 1: Introduction »

Release 2025 R2 - © ANSYS, Inc. All rights reserved.