How it works?

Virtual IT infrastructure

The simulation takes place in a predefined cyberspace, composed of various elements:

Objects

Objects are the basic elements of cyberspace. These can be devices (e.g. computers and servers), network equipment, software, services, databases, employees ...). Each object has its own properties that define its behaviour during the simulation. The available human resources are also objects of cyberspace described with the skills they possess.

Controls

The controls describe the resistance of an individual object to a cyber attack and the possibility of its detection. These can be antivirus systems, firewalls, various mechanisms and equipment for intrusion detection and prevention, backup systems, replication systems etc.

Business processes and services

Business processes and services can be added in cyberspace. How they depend on IT infrastructure and what impact cyber attacks may have on them is also described. It is possible to add other organizations with their services that may have impact on your business.

Actions

Each action has preconditions and consequences that affect the state of the cyber landscape. Actions require resources (people) to perform it and time to get done. They create outputs on which participants decide on further activities.

Attackers and threats

The simulation would not be complete without those who are behind the cyber attacks. States, criminal groups or individuals and other sources can be modelled as threats.

Defenders

Defender is modelled according to the available resources and skills their teams have. Virtual team members carry out given tasks and report on the results. Participants will make decisions based on feedback. It is possible for several training groups to participate in different roles.

Everything needed to carry out the exercise can be prepared by a team of Utilis and FER experts with minimal involvement of the organization that will conduct the exercise.

Find out more

Download the brochure

Contact us with additional questions, request a presentation or arrange an exercise tailored to your organization