Towards Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach

Attackers compromise organizations with increasingly sophisticated ways, such as Advanced Persistent Threat (APT) attackers. Usually, such attacks have the intention to exploit endpoints to gain access to critical data. For security controls and defense evaluation, organizations may employ offensive...

Full description

Bibliographic Details
Main Authors: Ajmal, A.B (Author), Alam, M. (Author), Khan, S. (Author), Mehbodniya, A. (Author), Waheed, A. (Author), Webber, J. (Author)
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Subjects:
Online Access:View Fulltext in Publisher
View in Scopus