• icon
  • medini analyze Cybersecurity Manual
  • forward
Contents
closeexpand
Print page
Expand/Collapse all
1. Introduction
1.1. Cybersecurity Perspective
2. Context Definition
2.1. Asset Identification
2.2. Security Attributes
2.3. Stakeholder Modeling
2.4. Vulnerability Analysis
3. Damage Scenarios
4. Threat Identification
5. Attacks and Attack Trees
5.1. Attack Tree Modeling
5.2. Attack Path Calculation
6. Risk Assessment
6.1. Risk Graph
6.1.1. HEAVENS Threat Level Parameters
6.1.2. HEAVENS Impact Level Parameters
6.1.3. HEAVENS Security / Risk Level
7. Risk Treatment
7.1. Security Measures
7.2. Security Goals and Security Requirements
8. Vulnerability Analysis
9. Configuration
9.1. Cybersecurity Project Settings
9.2. Cybersecurity Workspace Preferences
A. References
 
 Chapter 1: Introduction »

Contains proprietary and confidential information of ANSYS, Inc. and its subsidiaries and affiliates.

Release 2024 R2.01 - © ANSYS, Inc. All rights reserved.