Poolsappasit, Nayot, authorEdwards, John, authorRay, Indrajit, author2007-01-032007-01-032006http://hdl.handle.net/10217/89370Traditional Vulnerabilities scanners only give a list of vulnerabilities of the systems. This one dimensional information does not give analysts the perception of how exploits can be chained together and form more complex attack scenarios. We are developing an automate tool that takes the list of vulnerabilities and generates all possible attack scenarios known to the current security intellectual in the form of an attack tree model.born digitalStudent workspostersengCopyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright.vulnerabilitysecurity breachesattack treecomputer securityModel the system security risk by an attack treeText