Figure 8: Attack tree against a general computer system.
Back to Article
Copyright © 1999, Dr. Dobb's Journal