Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Abstract-attack graphs are used to compute potential attack paths from a ...