Activity-in-Diagram: Identify the Cyber-attack Surface

CreatorTim Ramey

Description



The different points in a system architecture where an attacker could gain entry to compromise a system or steal information from the system. The system's exposure to reachable and exploitable vulnerabilities (i.e., any connections, data exchange, service, removable media, etc., that could expose the system to potential threat access).

Owning Diagram A2: Phase 2: Characterize Attack Surface

Decomposition

A21: Identify the Cyber-attack Surface

Input

DoDAF Architecture Views

system design

Output

key cyber terrain

mission decomposition

Control

CONOPS

catalog of cybersecurity requirements

Cheif Developmental Tester

Mechanism

Cybersecurity DT&E Technical Experts