TARGETED ATTACK RESISTANCE ASSESMENT.

TARGETED ATTACK
RESISTANCE ASSESMENT.
HOW WELL CAN YOU WITHSTAND A CYBER ATTACK?
DETERMINED ATTACKERS
WILL SUCCEED
Realistic attack simulation to test the
true robustness of your cyber security.
When targeting a specific organisation, a determined,
well-resourced and knowledgeable cyber attacker will eventually
succeed. With enough time and access to the right tools and
techniques, they will adjust and re-adjust their approach until they
find a way in.
Penetrate organisation
Reconnaissance
Organisations facing such a determined threat often pose three
key questions: How long will an attack take to succeed? How
long before such an attack is detected? And how can defences
be improved?
MEASURING YOUR RESISTANCE
Our Targeted Attack Resistance Assessment systematically
examines how well your organisation or network can withstand a
targeted attack from a determined adversary.
We assess your ability to detect and defend against each stage of
a targeted attack (shown right). We use the models, knowledge
and experience we have developed over many years of investigating
sophisticated attacks across the globe.
Our assessment provides you with an executive-level view of your
resistance, supported by deep technical analysis and practical
recommendations. As a result, your defence against targeted
attacks will improve.
Infiltration
Exploit
vulnerabilities
Establish foothold
Escalate
privileges
Persistence
Remote access
Steal, disrupt or destroy
Lateral access
to other systems
Data
identification
and collection
Exfiltration
or damage
Clean up
BAE Systems Target Attack model
BAE Systems Applied Intelligence
FEATURES
BENEFITS
• Threat intelligence led
Our ongoing analysis of the tools and behaviours of the world’s
most sophisticated cyber attack groups provides relevance and
realism to our assessment
• Measures your true resistance so you can achieve the
resilience you need to thrive in a world where cyber attacks
are inevitable
• Diagnoses your specific weaknesses so you can spend your
money where it counts
• Active simulation
We combine multiple attack techniques together in our
assessment – just as a real attacker would in pursuit of
their goal
• Structured approach
We assess your detection and defence against each attack
stage in isolation and in combination to pinpoint key areas
for improvement
• Tailored to your needs
Our assessment can focus on individual stages or the
entire targeted attack model, allowing alignment to your
key concerns
ATTACK MODEL
WEEK 1
• Focuses on practical action so you can improve faster and
more efficiently
A Targeted Attack Resistance
Assessment reduces your exposure
to targeted attacks.
WEEK 2
WEEK 3
WEEK 4
WEEK 5
WEEK 6
RECONNAISSANCE
INFILTRATION
EXPLOITATION
REMORE ACCESS
PERSISTENCE
PRIVILEGED ESCALATION
LATERAL
DATA COLLECTION
EX-FILTRATION
CLEAN-UP
ESTIMATED TIME
TO INFILTRATE
FINDINGS
RECOMMENDATIONS
ESTIMATED TIME
TO DETECT
CURRENT EXPOSURE
,
INCREASED RESISTANCE
TO EXPOSURE
REDUCED EXPOSURE
INCREASE SPEED
OF DETECTION
For more information contact: BAE Systems Applied Intelligence
Surrey Research Park
Guildford
Surrey GU2 7RQ
United Kingdom
T: +44 (0) 1483 816000
E: [email protected] W: www.baesystems.com/ai
If you have been a victim of a cyber attack please
contact our Cyber Incident Response team on:
E: [email protected]
UK: 0808 168 6647
International: +44 1483 817491
Cyber Incident Response
www.twitter.com/baesystems
Copyright © BAE Systems 2014. All rights reserved.
BAE BAE SYSTEMS, the BAE SYSTEMS Logo and the product names referenced herein are trademarks of BAE Systems plc. BAE Systems Applied Intelligence Limited registered in England & Wales (No.1337451)
with its registered office at Surrey Research Park, Guildford, England, GU2 7RQ. No part of this document may be copied, reproduced, adapted or redistributed in any form or by any means without the express
prior written consent of BAE Systems Applied Intelligence.
CYNCIFSEN_FRA0414_TARA _v1
Certified Service
www.linkedin.com/company/baesystemsai