Software and Hardware Simulator of Company Security Audit
Keywords:information security, incident, event, classic model, MDR model, mixed model, maturity level, security operations model, modeling of vulnerabilities, protection check
To ensure the tasks of training professionals in the field of cybersecurity, a software and hardware complex has been created that provides training in various methods of protecting information and countering attacks. The possibilities of the complex are considered, as well as the experiments that were carried out during its development.
Brill, Alan, Kristina Misheva, and Metodi Hadji-Janev, eds. Toward Effective Cyber Defense in Accordance with the Rules of Law. Vol. 149. IOS Press, 2020.
Richard Stiennon. Cyber Defense: Countering Targeted Attacks. Rowman & Littlefield Pub Incorporated, 2012 – 192
RELIABILITY AND SAFETY ASSURANCE TECHNOLOGIES FOR COMPUTER AND INFORMATIONAL SYSTEMS