Hotspot
Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.
INSTRUCTIONS
Not all attacks and remediation actions will be used.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Web server Botnet Enable DDoS protection
User RAT Implement a host-based IPS
Database server Worm Change the default application password
Executive Keylogger Disable vulnerable services
Application Backdoor Implement 2FA using push notification