ATTACK FLOW PROJECT: CREATING THE ATTACK DIAGRAM
The previous table provides a quick view of attack paths, which is ideal for presenting to top management. However, our cybersecurity work must address not only top management but also the technical staff.
To create a more understandable attack diagram, we can rely on The Attack Flow Project.
This project allows you to create attack diagrams and also provides many useful examples for better understanding attack flows. The full corpus is available for download on the Attack Flow publication page, but individual diagrams can also be viewed online. Each attack flow is provided in several formats (.afb, .json, .dot, .mmd), making it easier to use by different audiences, whether technical or strategic.
Last updated