Why: To test if the administrators are prepared and evaluate the response on how to mitigate the issue when an attack happened.
How: Conduct simulation attack on an isolated environment then after the test analyze what went wrong and right during the simulation
What: Perform penetration testing on an isolated environment then analyze the results through logs.
3 years ago
3 years ago