TARGETED ATTACK RESISTANCE ASSESMENT. HOW WELL CAN YOU WITHSTAND A CYBER ATTACK? DETERMINED ATTACKERS WILL SUCCEED Realistic attack simulation to test the true robustness of your cyber security. When targeting a specific organisation, a determined, well-resourced and knowledgeable cyber attacker will eventually succeed. With enough time and access to the right tools and techniques, they will adjust and re-adjust their approach until they find a way in. Penetrate organisation Reconnaissance Organisations facing such a determined threat often pose three key questions: How long will an attack take to succeed? How long before such an attack is detected? And how can defences be improved? MEASURING YOUR RESISTANCE Our Targeted Attack Resistance Assessment systematically examines how well your organisation or network can withstand a targeted attack from a determined adversary. We assess your ability to detect and defend against each stage of a targeted attack (shown right). We use the models, knowledge and experience we have developed over many years of investigating sophisticated attacks across the globe. Our assessment provides you with an executive-level view of your resistance, supported by deep technical analysis and practical recommendations. As a result, your defence against targeted attacks will improve. Infiltration Exploit vulnerabilities Establish foothold Escalate privileges Persistence Remote access Steal, disrupt or destroy Lateral access to other systems Data identification and collection Exfiltration or damage Clean up BAE Systems Target Attack model BAE Systems Applied Intelligence FEATURES BENEFITS • Threat intelligence led Our ongoing analysis of the tools and behaviours of the world’s most sophisticated cyber attack groups provides relevance and realism to our assessment • Measures your true resistance so you can achieve the resilience you need to thrive in a world where cyber attacks are inevitable • Diagnoses your specific weaknesses so you can spend your money where it counts • Active simulation We combine multiple attack techniques together in our assessment – just as a real attacker would in pursuit of their goal • Structured approach We assess your detection and defence against each attack stage in isolation and in combination to pinpoint key areas for improvement • Tailored to your needs Our assessment can focus on individual stages or the entire targeted attack model, allowing alignment to your key concerns ATTACK MODEL WEEK 1 • Focuses on practical action so you can improve faster and more efficiently A Targeted Attack Resistance Assessment reduces your exposure to targeted attacks. WEEK 2 WEEK 3 WEEK 4 WEEK 5 WEEK 6 RECONNAISSANCE INFILTRATION EXPLOITATION REMORE ACCESS PERSISTENCE PRIVILEGED ESCALATION LATERAL DATA COLLECTION EX-FILTRATION CLEAN-UP ESTIMATED TIME TO INFILTRATE FINDINGS RECOMMENDATIONS ESTIMATED TIME TO DETECT CURRENT EXPOSURE , INCREASED RESISTANCE TO EXPOSURE REDUCED EXPOSURE INCREASE SPEED OF DETECTION For more information contact: BAE Systems Applied Intelligence Surrey Research Park Guildford Surrey GU2 7RQ United Kingdom T: +44 (0) 1483 816000 E: [email protected] W: www.baesystems.com/ai If you have been a victim of a cyber attack please contact our Cyber Incident Response team on: E: [email protected] UK: 0808 168 6647 International: +44 1483 817491 Cyber Incident Response www.twitter.com/baesystems Copyright © BAE Systems 2014. All rights reserved. BAE BAE SYSTEMS, the BAE SYSTEMS Logo and the product names referenced herein are trademarks of BAE Systems plc. BAE Systems Applied Intelligence Limited registered in England & Wales (No.1337451) with its registered office at Surrey Research Park, Guildford, England, GU2 7RQ. No part of this document may be copied, reproduced, adapted or redistributed in any form or by any means without the express prior written consent of BAE Systems Applied Intelligence. CYNCIFSEN_FRA0414_TARA _v1 Certified Service www.linkedin.com/company/baesystemsai
© Copyright 2026 Paperzz