Protect 2020
Practicing Reactions to Cyber Attacks
Protect 2020 Academy run E-Learning cyber security courses that are interactive, engaging and fun to complete. Each course is designed and created to deliver cost effective training solutions to all levels throughout your company. They are a fast-growing company in an innovative and exciting industry with a passion for training that changes and develops individual behaviours or even upskill an entire workforce.
Cyber security experts wanting to practice reacting to cyber attacks currently have no way of simulating an attack on their network, leaving them underprepared to defend against many types of advanced attack.
Reacting to the Users Own Network
Protect 2020 approached CEMET to develop a web app that would allow a cyber security expert to construct a replica of their network and simulate a large number of attacks against it. There’s an infinite number of variations in the components of a network and how each part is connected so Protect 2020 needed to create a solution that worked bespokely for each individual company. The user then needs to react by figuring out what the attack is and finding a way to stop it, protecting data and better preparing the user for a real life attack.
Artificial Intelligence Detects Weak Points in the Network
Running simulate will enable the artificial intelligence behind the software to look at the network makeup, analyse the network vulnerabilities and select from the relevant attack vectors which cyber attack to run. The AI weights each attack vector based on what would have the most impact and which the network is most vulnerable to. These attacks will be chosen most often. Once the software has chosen which cyber attack to run, the artificial intelligence then plots it’s route through the network, attacking each relevant component in a realistic order and timeframe.
For the cyber security professionals to be best prepared to any attack, the simulation needs to be as realistic as possible. The simulation therefore doesn’t tell the user what type of attack is happening, rather a warning pops up on a component in the network, telling the user that something unusual is happening inside the component. The user then needs to figure out what kind of cyber attack they are under by manipulating different components of the network, once they figure out the type of attack they then take action to stop it.