Adversary Emulation
Adversary emulation, also known as adversary simulation, is
a cybersecurity practice in which security experts imitate the actions
of cyber threat actors to attack an organization's systems. The goal is to
improve people, processes, and technology through ethical hacking engagements.
Adversary emulation involves:
- Penetration testing: This includes network mapping, vulnerability scanning, phishing assessments, and web application testing.
- Tactics, techniques, and procedures (TTPs): Security experts use the same TTPs that real-world adversaries to target organizations.
- Training: The goal is to train and improve people, processes, and technology.
Adversary emulation plans (AEPs) include an overview of the
plan, the adversary group, the emulation phases, and a biography of sources.
No comments:
Post a Comment