11192122 - Cybersecurity Training Book

ASSUMPTIONS AND ARTIFICIALITIES

 This exercise will be conducted in a no-fault environment and will evaluate the existing plans, policies, and procedure as if players were responding to a real- world emergency.  Earnest effort has been made to create a plausible and realistic scenario to evaluate and validate identified objectives.  The exercise is not to be viewed as a test of inspections of individual performance.  There is no hidden agenda and there are no trick questions.  The timeline here does not reflect actual times – ransomware is known to start extremely quickly as low as three seconds after the file has been executed.  Realistically once the IT department has been notified the majority of the data has already been encrypted.

Made with FlippingBook - Online catalogs