How it works?
Virtual IT infrastructure
The simulation takes place in a predefined cyberspace, composed of various elements:
Objects
Objects are the basic elements of cyberspace. These can be devices (e.g. computers and servers), network equipment, software, services, databases, employees ...). Each object has its own properties that define its behaviour during the simulation. The available human resources are also objects of cyberspace described with the skills they possess.
Controls
The controls describe the resistance of an individual object to a cyber attack and the possibility of its detection. These can be antivirus systems, firewalls, various mechanisms and equipment for intrusion detection and prevention, backup systems, replication systems etc.
Business processes and services
Business processes and services can be added in cyberspace. How they depend on IT infrastructure and what impact cyber attacks may have on them is also described. It is possible to add other organizations with their services that may have impact on your business.
Actions
Each action has preconditions and consequences that affect the state of the cyber landscape. Actions require resources (people) to perform it and time to get done. They create outputs on which participants decide on further activities.
Attackers and threats
The simulation would not be complete without those who are behind the cyber attacks. States, criminal groups or individuals and other sources can be modelled as threats.
Defenders
Defender is modelled according to the available resources and skills their teams have. Virtual team members carry out given tasks and report on the results. Participants will make decisions based on feedback. It is possible for several training groups to participate in different roles.
Everything needed to carry out the exercise can be prepared by a team of Utilis and FER experts with minimal involvement of the organization that will conduct the exercise.
Download the brochure
Contact us with additional questions, request a presentation or arrange an exercise tailored to your organization