Creating and managing realism in the next-generation cyber range

DG Ionica, F Pop, A Castiglione�- …�, NSS 2018, Hong Kong, China, August�…, 2018 - Springer
Network and System Security: 12th International Conference, NSS 2018, Hong�…, 2018Springer
There are numerous potential digital range arrangements and situations that a very much
outlined range can achieve. We have experienced several use cases, and we
acknowledged that every last mechanism requires distinctive human components, scale,
and assault and safeguard standards. What you will likewise discover is that these things
devour a lot of HR and set-up, readiness, and examination time, which compare to time and
cash. These standards may make you oblige your activities to the point that they get to be�…
Abstract
There are numerous potential digital range arrangements and situations that a very much outlined range can achieve. We have experienced several use cases, and we acknowledged that every last mechanism requires distinctive human components, scale, and assault and safeguard standards. What you will likewise discover is that these things devour a lot of HR and set-up, readiness, and examination time, which compare to time and cash. These standards may make you oblige your activities to the point that they get to be distinctly lumbering and do not yield the outcomes that you need. You can without much of a stretch get overpowered with these essential variables to the disservice of your activities, consequently lessening your adequacy and precluding your benefits from having the capacity to prepare as they battle genuinely. This paper presents real-world attack-defence scenarios for cybersecurity training.
Springer
Showing the best result for this search. See all results