Research Article

Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

Figure 1

Top causes of data breaches [4].