Welcome to the Learn More section!
This is a collection of documentation, examples and reference material.
The collection of Example Models contains downloadable models with descriptions. They are a good starting point for modeling similar environments or for incorporating in your existing models.
The use of components is highly encouraged while creating models. And if there is no suitable component available, you can create your own.
Importing data from different sources can be useful both for adding detail to an existing high level model or to outline an environment not yet modeled. Importing external data is a feature that is part of securiCAD Enterprise.
An Attack Vector is a combination of attacker methodology and attacker resources. From a modeling perspective, we see the Attack Vector as the starting point of an attack, possibly with some suitable attenuation. This document describes how to model different types of attack vectors.
Starting from a minimalistic piece of input, this is your guide to low level modeling. It will lead you through building a model from scratch using basic modeling objects. Different types of objects and connections are described along the way. This is a very good start when you want to start creating your own tailor made components or for a deeper understanding in securiCAD modeling in general.
Description of more general functions in the securiCAD Community Edition and Professional Edition softwares.
securiCAD modeling objects and connections are defined by securiLang. This module is your securiLang documentation on object, connection, attack step and defense definitions.
If you want to know how the simulations work, how an attack path is calculated, how probabilities weigh together and how the research and statistics relate to the simulation results in securiCAD, this “Behind the Scenes” section is for you.
This blog series aims to summarize and describe some of the best and most recent research efforts from KTH in cyber security, threat modeling, attack simulations, risk analysis, and ethical hacking.