There are numerous potential digital range arrangements and situations that a very much outlined range can achieve. We have experienced several use cases, and we acknowledged that every last mechanism requires distinctive human components, scale, and assault and safeguard standards. What you will likewise discover is that these things devour a lot of HR and set-up, readiness, and examination time, which compare to time and cash. These standards may make you oblige your activities to the point that they get to be distinctly lumbering and do not yield the outcomes that you need. You can without much of a stretch get overpowered with these essential variables to the disservice of your activities, consequently lessening your adequacy and precluding your benefits from having the capacity to prepare as they battle genuinely. This paper presents real-world attack-defence scenarios for cybersecurity training.

Creating and managing realism in the next-generation cyber range

Castiglione A.
2018-01-01

Abstract

There are numerous potential digital range arrangements and situations that a very much outlined range can achieve. We have experienced several use cases, and we acknowledged that every last mechanism requires distinctive human components, scale, and assault and safeguard standards. What you will likewise discover is that these things devour a lot of HR and set-up, readiness, and examination time, which compare to time and cash. These standards may make you oblige your activities to the point that they get to be distinctly lumbering and do not yield the outcomes that you need. You can without much of a stretch get overpowered with these essential variables to the disservice of your activities, consequently lessening your adequacy and precluding your benefits from having the capacity to prepare as they battle genuinely. This paper presents real-world attack-defence scenarios for cybersecurity training.
978-3-030-02743-8
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11386/4810872
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact