Methods, systems and computer readable media for threat simulation and threat mitigation recommendations
The method includes performing a threat simulation using at least one attack vector by generating simulated network traffic associated with the at least one attack vector and sending, via at least one intermediate node, the simulated traffic to a test agent configured to simulate at least one protec...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The method includes performing a threat simulation using at least one attack vector by generating simulated network traffic associated with the at least one attack vector and sending, via at least one intermediate node, the simulated traffic to a test agent configured to simulate at least one protected asset in a target network. Using the simulated network traffic arrival metrics at least one threat mitigation recommendation is determined and provided, via a user interface, to a user. Threat mitigation recommendations may include feedback based on users and/or other experts. For example, as recommendations are implemented and validated by users they may provide feedback (e.g., an efficacy rating from 1-5 stars) indicating the effectiveness of the recommendation based on the user's experience. Recommendations may be organised by type such as 'fix, reduce, prevent' e.g. 'apply vendor patch', 'block IP', 'check anti-malware is up to date'. Subsequent users may be able to view or access this feedback to make more informed decisions regarding which mitigation recommendations to use. |
---|