Cyber War Games

Cyber War Games

Cyber war game activities let companies practice their responses to a range of cyber incidents, thereby helping to improve their resilience when inevitable cyber-attacks occur by an interactive exercise that immerses participants in a simulated cyber-attack scenario, such as a data breach, website defacement, denial of service attack, or the discovery of sophisticated malware on a corporate network.

How Cyber War Games Work

Based on a war game scenario facing the organization and its industry, and the organization’s objectives for the exercise.

It can range from “table top” exercises to full-blown, dynamic simulations. In a table top activity, facilitators brief participants from different business functions on the attack scenario; participants then go about exercising the company’s incident response plan

Simulations are structured differently. Participants typically don’t know when the “attack” will occur or what form it will take. Instead, they have to piece together clues they receive from facilitators indicating something is amiss. Those clues could be applications that are running slowly, timing out, or otherwise improperly functioning.

Reference: https://deloitte.wsj.com/cio/2014/09/22/an-introduction-to-cyber-war-games/


#cybersecurity #security #infosec #cyberwargames #ethicalhacking

要查看或添加评论,请登录

社区洞察

其他会员也浏览了