-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
32 lines (30 loc) · 2 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
---
layout: splash
author_profile: true
title: Homepage
home: home
custom_css: about
---
<h1>Breach and Attack Simulation Tools</h1>
A <p>Breach and Attack Simulation Tool</p> is a security testing software that enables simulating realistic
attacks with an automation-oriented approach. The simulation must be standardized, reproducible
and allow for continuous testing. The tool aims to examine the system's security and produce results
accordingly, outlining vulnerabilities and suggesting mitigations.
</br></br>
During the last 10 years a great number of tools have been implemented in order to improve this process reducing the time required,
broadening the coverage of attacks and reducing the cost of having a red team.
The current panorama of technologies related to this field is complex: there are different softwares that use diverse terminologies and have very different capabilities and features.
</br></br>
This website contains three different contributions:
<ul>
<li>
<a href="{{'/technology' | relative_url }}" title="Technology">Technology</a> offers an in-depth examination of Breach and Attack Simulation (BAS) Tools, covering their use cases, benefits, and general methods of application within the cybersecurity domain.
</li>
<li>
<a href="{{'/framework' | relative_url }}" title="Framework">Framework</a> introduces a systematic framework for evaluating Breach and Attack Simulation (BAS) Tools, focusing on their capabilities and enabling comparisons among different tools.
compare it with others. The framework is exemplified through a <a href="{{'/casestudy' | relative_url }}" title="Study Case">case study</a> of MITRE CALDERA®.
</li>
<li>
The <a href="{{'/finder' | relative_url }}" title="Finder">Finder</a> function is designed to assist in identifying the most effective Breach and Attack Simulation (BAS) Tools tailored to particular needs and objectives, thereby supporting the selection of the optimal cybersecurity solution.
</li>
</ul>