Cybersecurity Reference > Glossary
Attack Graph
An Attack Graph is a visual representation that maps potential attack paths through a network or system.
This cybersecurity modeling tool illustrates how an attacker might exploit vulnerabilities and move laterally through an environment to reach specific targets or objectives.
Attack graphs typically display nodes representing system states, network assets, or security conditions, connected by edges that show possible attack transitions or exploit sequences. They help security teams understand the relationships between different vulnerabilities and how seemingly minor security weaknesses might be chained together to create significant risks.
These models serve multiple purposes in cybersecurity planning. They enable risk assessment by highlighting the most critical attack paths, support vulnerability prioritization by showing which flaws pose the greatest threat when combined with others, and aid in defensive planning by revealing where security controls would be most effective. Attack graphs can range from simple pathway diagrams to complex mathematical models that incorporate probability assessments and impact calculations.
Modern attack graph tools often integrate with vulnerability scanners and network discovery systems to automatically generate and update these visualizations as network conditions change, making them valuable for ongoing security monitoring and strategic defense planning.
Need Help Mapping Your Attack Surface?
Plurilock's attack graph analysis reveals critical pathways attackers could exploit.
Get Attack Graph Analysis → Learn more →




