Application of the Survivable Network Analysis Method to Secure My Office System
This paper addresses the results of applying the Survivable Network Analysis method to my office system. A brief overview of the method will be presented followed by a detailed description of the method. The method consists of four basic steps which will be explained. I will show how to implement...