Attack and User Simulations
User simulations
- Standard user behavior simulations
- Real-world HEAT users
- Live scenarios captured for replay
- Computer generated behavior sets for various access types (World-Wide Web use, gopher, database access, etc.)
Attacks simulated from
- threat profiles
- real-world attack scripts and incident data
- pseudo-random attack generation
- menu-based attack generation and control
- human expert attackers with tools