Toward Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach

Attackers compromise organizations with increasingly sophisticated ways, such as Advanced Persistent Threat (APT) attackers. Usually, such attacks have the intention to exploit endpoints to gain access to critical data. For security controls and defense evaluation, organizations may employ offensive...

Full description

Bibliographic Details
Main Authors: Abdul Basit Ajmal, Shawal Khan, Masoom Alam, Abolfazl Mehbodniya, Julian Webber, Abdul Waheed
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10114933/