Provided by: SBBooks, Inc.
Everyday more confidential data are brought to computers. Leak of those data is a critical concern to nowadays organizations. Fuel level, water and power distribution, location of supply, armament and specialists, tactical operations, control power plants and stations and war plans are just part of a growing list of targets. Due to the outstanding need of control the technology of cyber war simulations to train professionals, civilian or military, the authors have developed this paper. Exercises with simulated attacks have been teaching people about the attacks and vulnerabilities and how to deal with them in a theoretical way.