Calculating Edge Probability in CYE’s Mitigation Graph
CYE’s mitigation graph outlines all possible attack routes that may be exploited by an attacker to gain access and control of critical business assets in the organization. A key feature is the prioritization of threats, based on probability of their occurrence, along with the impact of compromising an asset. This helps with prioritizing and optimizing mitigation.
This technical paper provides an overview of how CYE calculates the probability of an attacker’s route according to findings that can be potentially exploited.
- How CYE’s mitigation graphs illustrate exposure to threat scenarios
- Why CVSS is impractical for assessing risk and prioritizing mitigation
- The factors CYE considers for estimating probability
Download the guide for a deeper understanding of how CYE prioritizes threats and optimizes mitigation.