Cyber Range Use Cases
CYBER RANGES will help you become more Cyber Secure
The following Cyber Range Use Cases are based on the ECSO White Paper “UNDERSTANDING CYBER RANGES: FROM HYPE TO REALITY” Released 30/03/2020
Applicable
Orchestration
Internet Services
Simulation User Activity
Simulation
Competency Management
Scenarios & Content Development
Data Collection &
Analysis Scoring
Required
Attack Simulation
Desirable
N/A
Applicable
Orchestration
Internet Services Simulation
User Activity Simulation
Competency Management
Scenarios & Content Development
Data Collection &
Analysis
Scoring & Reporting
Instructor Tools
Required
N/A
Desirable
Orchestration
Attack Simulation
User Activity Simulation
Data Collection & Analysis
Applicable
Internet Services Simulation
User Activity Simulation
Required
Competency Management
Scoring & Reporting
Instructor Tools
Desirable
Orchestration
Attack Simulation
Scenarios & Content Development
Data Collection & Analysis
Applicable
User Activity Simulation
Required
Orchestration
Competency Management
Scoring & Reporting
Instructor Tools& Reporting
Instructor Tools
Desirable
Internet Services Simulation
Attack Simulation
Scenarios & Content Development
Data Collection & Analysis
Applicable
N/A
Required
Attack Simulation
User Activity Simulation
Data Collection & Analysis
Scoring & Reporting
Desirable
Orchestration
Internet Services Simulation
Competency Management
Scenarios & Content Development
Instructor Tools
Applicable
Orchestration
Internet Services Simulation
Required
Attack Simulation
Desirable
User Activity Simulation
Competency Management
Scenarios & Content Development
Data Collection & Analysis
Scoring & Reporting
Instructor Tools
Applicable
Internet Services Simulation
User Activity Simulation
Scenarios & Content Development
Required
Competency Management
Scoring & Reporting
Instructor Tools
Desirable
Orchestration
Attack Simulation
Scenarios & Content Development
Applicable
Internet Services Simulation
Attack Simulation
User Activity Simulation
Instructor Tools
Required
Desirable
Applicable
Internet Services Simulation
Attack Simulation
Competency Management
Data Collection & Analysis
Scoring & Reporting
Instructor Tools
Required
Desirable
Applicable
Internet Services Simulation
Attack Simulation
Competency Management
Data Collection & Analysis
Scoring & Reporting
Instructor Tools
Required
Orchestration
Desirable
User Activity Simulation
Scenarios & Content Development
Of course, the vertical markets your organization is in, such as:
defence and law enforcement, banking & finance, education & research, HR, critical infrastructure (telecom, energy & transport, etc.), government, healthcare/pharma, national CERTs
…all may dictate some specific functional requirements!
Why Choose CYBER RANGES
The cyber range product or service you eventually choose, will only be as good as it can help you effectively achieve: All the goals and objectives of the cyber exercises you want to run The full realism of the cyber learning and testing you want to ensure The desired/needed extent of simulation and customization to your specific operational infrastructure and circumstances; The unleashing of all the cyber firepower you want to assess. The high number of participants to involve The effective gathering and analysis of intelligence from the range itself
in order to test your organization and people’s dexterity, capacity, capability and resilience against cyber hazards, threats and attacks and to effectively address any gaps and shortages.