{"id":1858,"date":"2023-01-11T14:11:15","date_gmt":"2023-01-11T14:11:15","guid":{"rendered":"https:\/\/firmussec.com\/sg-dev\/dev\/?page_id=1858"},"modified":"2024-06-04T12:31:41","modified_gmt":"2024-06-04T04:31:41","slug":"breach-and-attack-simulation-bas","status":"publish","type":"page","link":"https:\/\/firmussec.com\/sg\/our-services\/assessment\/breach-and-attack-simulation-bas\/","title":{"rendered":"Breach and Attack Simulation (BAS)"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:5%;--awb-padding-bottom:3%;--awb-padding-top-medium:90px;--awb-padding-bottom-medium:90px;--awb-margin-bottom-medium:0px;--awb-background-color:var(--awb-color1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-flex-end fusion-flex-content-wrap\" style=\"max-width:calc( 1160px + 80px );margin-left: calc(-80px \/ 2 );margin-right: calc(-80px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_3_5 3_5 fusion-flex-column fusion-flex-align-self-stretch fusion-column-no-min-height fusion-animated\" style=\"--awb-padding-right-medium:0px;--awb-padding-left-medium:0px;--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:calc( 0.13333333333333 * calc( 100% - 80px ) );--awb-margin-bottom-large:50px;--awb-spacing-left-large:40px;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:calc( 0.16 * calc( 100% - 80px ) );--awb-margin-bottom-medium:49px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-margin-bottom-small:0px;--awb-spacing-left-small:40px;\" data-animationType=\"fadeIn\" data-animationDuration=\"0.8\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 fusion-text-no-margin\" style=\"--awb-font-size:var(--awb-typography3-font-size);--awb-line-height:var(--awb-typography3-line-height);--awb-letter-spacing:var(--awb-typography3-letter-spacing);--awb-text-transform:var(--awb-typography3-text-transform);--awb-text-color:var(--awb-color5);--awb-text-font-family:var(--awb-typography3-font-family);--awb-text-font-weight:var(--awb-typography3-font-weight);--awb-text-font-style:var(--awb-typography3-font-style);\"><p>Assessment<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:0px;--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:30;line-height:1.25;\"><h2><span data-contrast=\"auto\">Strengthen Your Cyber Security with Our Breach and Attack Simulation (BAS)<\/span><span data-ccp-props=\"\">\u00a0<\/span><span data-contrast=\"auto\">Services<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/h2><\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_5 2_5 fusion-flex-column fusion-flex-align-self-stretch fusion-column-no-min-height fusion-animated\" style=\"--awb-padding-right-medium:0px;--awb-padding-left-medium:0px;--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:50px;--awb-spacing-left-large:calc( 0.04 * calc( 100% - 80px ) );--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-margin-bottom-medium:49px;--awb-spacing-left-medium:calc( 0.032 * calc( 100% - 80px ) );--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-margin-bottom-small:30px;--awb-spacing-left-small:40px;\" data-animationType=\"fadeIn\" data-animationDuration=\"0.8\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-content-alignment:justify;--awb-text-color:hsla(var(--awb-color8-h),var(--awb-color8-s),var(--awb-color8-l),calc(var(--awb-color8-a) - 20%));--awb-margin-bottom:10px;\"><p>Ensuring that all those network \/ security devices that was bought by your organization is actually working for you.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);--awb-filter:saturate(0%);--awb-filter-transition:filter 0.3s ease;--awb-filter-hover:saturate(100%);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2000\" height=\"500\" alt=\"Breach and Attack Simulation Services (BAS Solution) \" title=\"Cyber Attack Simulation\" src=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2023\/01\/Cyber-Attack-Simulation.jpg\" data-orig-src=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2023\/01\/Cyber-Attack-Simulation.jpg\" class=\"lazyload img-responsive wp-image-1859\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%272000%27%20height%3D%27500%27%20viewBox%3D%270%200%202000%20500%27%3E%3Crect%20width%3D%272000%27%20height%3D%27500%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2023\/01\/Cyber-Attack-Simulation-200x50.jpg 200w, https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2023\/01\/Cyber-Attack-Simulation-400x100.jpg 400w, https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2023\/01\/Cyber-Attack-Simulation-600x150.jpg 600w, https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2023\/01\/Cyber-Attack-Simulation-800x200.jpg 800w, https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2023\/01\/Cyber-Attack-Simulation-1200x300.jpg 1200w, https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2023\/01\/Cyber-Attack-Simulation.jpg 2000w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:40px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\" style=\"--awb-content-alignment:justify;\"><p>Cyber Attack Assessment is a service to ensure that all those network \/ security devices that were bought by your organisation are actually working for you. The objective of this assessment is to simulate a real-world cyber attack on an organisation\u2019s infrastructure and see how the network and security devices are reacting to it. Is it able to block the attacks or is there any tweaks to be done on the configuration types to block these attacks? Does your Next Gen Firewall, Web Application Firewall, Intrustion Prevention \/ Detection Systems are working as they supposed to? These answers can be obtained if these assessments are performed.<\/p>\n<p>Below are the types of attacks that FIRMUS penetration testing could perform and that can be customised for each client depending on the environment and type of devices they have.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-no-small-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-3 fusion-columns-total-3 fusion-content-boxes-1 content-boxes-timeline-horizontal content-left content-boxes-icon-on-top content-boxes-timeline-layout fusion-delayed-animation\" style=\"--awb-body-color:var(--awb-color7);--awb-iconcolor:var(--awb-color1);--awb-hover-accent-color:var(--awb-color5);--awb-circle-hover-accent-color:var(--awb-color5);\" data-animation-delay=\"350\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:var(--awb-color1);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\" style=\"-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color5);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-robot fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">ATTACK EMULATION<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p style=\"margin-bottom: 0px;\">Denial of Service<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nSQL Injection<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nBuffer Overflow<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nStack Overflow<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nMan in the Middle Attack<\/p>\n<\/div><div class=\"content-box-shortcode-timeline\" style=\"border-color:rgba(255,255,255,0);top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color1);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover \"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\" style=\"-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color5);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-horse-head fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">MALWARE ATTACK EMULATION<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Worms<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nTrojans<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nBotnet<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nBackdoor<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nViruses<\/p>\n<\/div><div class=\"content-box-shortcode-timeline\" style=\"border-color:rgba(255,255,255,0);top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color1);--awb-iconcolor:var(--awb-color1);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\" style=\"-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color5);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-bacteria fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">ADVANCED FUZZING EMULATION<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Network Appliances<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nWeb Application<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nWeb API<\/p>\n<\/div><div class=\"content-box-shortcode-timeline\" style=\"border-color:rgba(255,255,255,0);top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-5 fusion-content-boxes-2 content-boxes-timeline-vertical content-left content-boxes-timeline-layout content-boxes-icon-with-title fusion-delayed-animation\" style=\"--awb-backgroundcolor:var(--awb-color5);--awb-body-color:var(--awb-color7);--awb-title-color:var(--awb-color1);--awb-iconcolor:var(--awb-color5);--awb-hover-accent-color:var(--awb-color1);--awb-circle-hover-accent-color:var(--awb-color1);--awb-item-margin-bottom:40px;\" data-animation-delay=\"350\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:var(--awb-color5);--awb-iconcolor:var(--awb-color5);--awb-content-padding-left:68px;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:15px;\"><div class=\"icon\" style=\"margin-top:-15px;margin-bottom:-15px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color1);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-search fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">Information Gathering<\/h3><\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:74px;top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color5);--awb-iconcolor:var(--awb-color5);--awb-content-padding-left:68px;\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:15px;\"><div class=\"icon\" style=\"margin-top:-15px;margin-bottom:-15px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color1);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-project-diagram fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">Network Setup &amp; Test Run<\/h3><\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:74px;top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color5);--awb-iconcolor:var(--awb-color5);--awb-content-padding-left:68px;\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:15px;\"><div class=\"icon\" style=\"margin-top:-15px;margin-bottom:-15px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color1);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-robot fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">Selection of Attack &amp; Signatures<\/h3><\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:74px;top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color5);--awb-iconcolor:var(--awb-color5);--awb-content-padding-left:68px;\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:15px;\"><div class=\"icon\" style=\"margin-top:-15px;margin-bottom:-15px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color1);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-laptop-code fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">Launch of Attack &amp; Response Gathering<\/h3><\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:74px;top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color5);--awb-iconcolor:var(--awb-color5);--awb-content-padding-left:68px;\" class=\"fusion-column content-box-column content-box-column content-box-column-5 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:15px;\"><div class=\"icon\" style=\"margin-top:-15px;margin-bottom:-15px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color1);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-chart-area fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">Analysis &amp; Reporting<\/h3><\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:74px;top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-no-small-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-3 fusion-columns-total-5 fusion-content-boxes-3 content-boxes-timeline-horizontal content-left content-boxes-icon-on-top content-boxes-timeline-layout fusion-delayed-animation\" style=\"--awb-backgroundcolor:var(--awb-color5);--awb-body-color:var(--awb-color7);--awb-title-color:var(--awb-color1);--awb-iconcolor:var(--awb-color5);--awb-hover-accent-color:var(--awb-color1);--awb-circle-hover-accent-color:var(--awb-color1);\" data-animation-delay=\"350\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:var(--awb-color5);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\" style=\"-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color1);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-search fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">Information<br \/>\nGathering<\/h3><\/div><div class=\"content-box-shortcode-timeline\" style=\"border-color:rgba(255,255,255,0);top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color5);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover \"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\" style=\"-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color1);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-project-diagram fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">Network Setup &amp;<br \/>\nTest Run<\/h3><\/div><div class=\"content-box-shortcode-timeline\" style=\"border-color:rgba(255,255,255,0);top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color5);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\" style=\"-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color1);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-robot fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">Selection of Attack &amp;<br \/>\nSignatures<\/h3><\/div><div class=\"content-box-shortcode-timeline\" style=\"border-color:rgba(255,255,255,0);top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color5);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\" style=\"-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color1);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-laptop-code fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">Launch of Attack &amp; Response Gathering<\/h3><\/div><div class=\"content-box-shortcode-timeline\" style=\"border-color:rgba(255,255,255,0);top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color5);--awb-iconcolor:var(--awb-color5);\" class=\"fusion-column content-box-column content-box-column content-box-column-5 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-last\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\" style=\"-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color1);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-chart-area fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">Analysis &amp;<br \/>\nReporting<\/h3><\/div><div class=\"content-box-shortcode-timeline\" style=\"border-color:rgba(255,255,255,0);top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:40px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:40px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:40px;--awb-spacing-left-medium:40px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-spacing-left-small:40px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-3 fusion-content-boxes-4 content-boxes-timeline-vertical content-left content-boxes-timeline-layout content-boxes-icon-with-title fusion-delayed-animation\" style=\"--awb-body-color:var(--awb-color7);--awb-iconcolor:var(--awb-color1);--awb-hover-accent-color:var(--awb-color5);--awb-circle-hover-accent-color:var(--awb-color5);--awb-item-margin-bottom:40px;\" data-animation-delay=\"350\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:var(--awb-color1);--awb-iconcolor:var(--awb-color1);--awb-content-padding-left:68px;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:15px;\"><div class=\"icon\" style=\"margin-top:-15px;margin-bottom:-15px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color5);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-robot fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">ATTACK EMULATION<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p style=\"margin-bottom: 0px;\">Denial of Service<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nSQL Injection<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nBuffer Overflow<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nStack Overflow<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nMan in the Middle Attack<\/p>\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:74px;top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color1);--awb-iconcolor:var(--awb-color1);--awb-content-padding-left:68px;\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:15px;\"><div class=\"icon\" style=\"margin-top:-15px;margin-bottom:-15px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color5);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-horse-head fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">MALWARE ATTACK EMULATION<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Worms<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nTrojans<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nBotnet<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nBackdoor<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nViruses<\/p>\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:74px;top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:var(--awb-color1);--awb-iconcolor:var(--awb-color1);--awb-content-padding-left:68px;\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:15px;\"><div class=\"icon\" style=\"margin-top:-15px;margin-bottom:-15px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color5);box-sizing:content-box;height:48px;width:48px;line-height:48px;border-radius:50%;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-bacteria fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:18px;--fontSize:18;line-height:1.3;\">ADVANCED FUZZING EMULATION<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<p>Network Appliances<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nWeb Application<div class=\"fusion-separator\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;width:100%;max-width:50%;\"><div class=\"fusion-separator-border sep-single sep-dashed\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div>\nWeb API<\/p>\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:74px;top:59px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1206.4px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;max-width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-bg-parallax\" data-bg-align=\"center center\" data-direction=\"down\" data-mute=\"false\" data-opacity=\"100\" data-velocity=\"-0.3\" data-mobile-enabled=\"false\" data-break_parents=\"0\" data-bg-image=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2022\/01\/bg-crypto-brand-transparent.png\" data-bg-repeat=\"false\" data-bg-color=\"var(--awb-color1)\" data-blend-mode=\"screen\" ><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-down nonhundred-percent-fullwidth non-hundred-percent-height-scrolling lazyload\" style=\"--awb-background-blend-mode:screen;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:5%;--awb-padding-bottom:0%;--awb-margin-bottom:0px;--awb-background-color:var(--awb-color1);--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2022\/01\/bg-crypto-brand-transparent.png\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1206.4px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_3 1_3 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height fusion-animated\" style=\"--awb-padding-right-medium:0px;--awb-padding-left-medium:0px;--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:23.04%;--awb-margin-bottom-large:90px;--awb-spacing-left-large:5.76%;--awb-width-medium:75%;--awb-order-medium:0;--awb-spacing-right-medium:10.24%;--awb-margin-bottom-medium:49px;--awb-spacing-left-medium:2.56%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:7.68%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeIn\" data-animationDuration=\"0.8\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.3;\">Explore Our Assessment Services<\/h3><\/div><div class=\"fusion-text fusion-text-4\"><p>Let us help you make informed decisions and set your business up for success through our range of assessment services.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height fusion-animated\" style=\"--awb-padding-right-medium:0px;--awb-padding-left-medium:0px;--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:80px;--awb-spacing-left-large:2.304%;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-right-medium:7.68%;--awb-margin-bottom-medium:49px;--awb-spacing-left-medium:6.144%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:40px;--awb-margin-bottom-small:30px;--awb-spacing-left-small:40px;\" data-animationType=\"fadeIn\" data-animationDuration=\"0.8\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-3 fusion-columns-total-13 fusion-content-boxes-5 content-boxes-icon-with-title content-left\" style=\"--awb-body-color:var(--awb-color7);--awb-title-color:var(--awb-color7);--awb-hover-accent-color:var(--awb-color5);--awb-circle-hover-accent-color:transparent;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/network-penetration-testing\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-project-diagram fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Network Penetration Testing<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover \"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/web-application-penetration-testing\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-window-maximize fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Web Application Penetration Testing<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/incident-response\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-virus fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Incident Response (IR)<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/source-code-review\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-laptop-code fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Source Code Review<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-5 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover \"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/mobile-application-penetration-testing\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-mobile-alt fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Mobile Application Penetration Testing<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-6 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/security-configuration-review\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-file-signature fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Security Configuration Review<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-7 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/social-engineering\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-users fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Social Engineering<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-8 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover \"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/wireless-penetration-testing\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-wifi fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Wireless Penetration Testing<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-9 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/breach-and-attack-simulation-bas\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-robot fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Breach and Attack Simulation (BAS)<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-10 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/compromise-assessment\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-laptop-medical fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Compromise Assessment<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-11 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover \"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/intelligence-led-penetration-testing\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-brain fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Intelligence Led Penetration Testing<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-12 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/network-resiliency-assessment\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-network-wired fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Network Resiliency Assessment<\/p><\/a><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-13 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row content-box-column-last\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon link-type-text icon-hover-animation-slide\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><a class=\"heading-link\" style=\"float:left;\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/red-teaming\/\" target=\"_self\"><div class=\"icon\"><i style=\"background-color:transparent;border-color:transparent;height:auto;width: 24px;line-height:normal;font-size:24px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-user-secret fas circle-no\"><\/i><\/div><p class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--body_typography-font-size:16px;--fontSize:16;line-height:1.5;\">Red Teaming<\/p><\/a><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:25px;--awb-margin-top:-50px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1206.4px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:1.3;\"><h2 style=\"text-align: center;\"><span class=\"TextRun SCXW213821906 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW213821906 BCX8\">BREACH AND ATTACK SIMULATION (BAS) FAQS<\/span><\/span><span class=\"EOP SCXW213821906 BCX8\" data-ccp-props=\"\">\u00a0<\/span><\/h2><\/h3><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_6 1_6 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:10.368%;--awb-width-medium:16.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:23.04%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_2_3 2_3 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.592%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color8);--awb-content-color:var(--awb-color7);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color5);--awb-title-font-family:&quot;Montserrat&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:16px;--awb-title-line-height:1.5;--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-1858-1\"><div class=\"fusion-panel panel-default panel-5e594ec661f457611 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color5);--awb-content-color:var(--awb-color7);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_5e594ec661f457611\"><a aria-expanded=\"false\" aria-controls=\"5e594ec661f457611\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1858-1\" data-target=\"#5e594ec661f457611\" href=\"#5e594ec661f457611\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What is Breach and Attack Simulation (BAS)? <\/span><\/a><\/h4><\/div><div id=\"5e594ec661f457611\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_5e594ec661f457611\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><span class=\"TextRun SCXW24833761 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW24833761 BCX8\">Breach and Attack Simulation (BAS) is a <\/span><span class=\"NormalTextRun SCXW24833761 BCX8\">cutting-edge<\/span><span class=\"NormalTextRun SCXW24833761 BCX8\"> method used to test the effectiveness of IT security programs by simulating real-world <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW24833761 BCX8\">cyber attacks<\/span><span class=\"NormalTextRun SCXW24833761 BCX8\">. BAS solutions mimic various attack actions to evaluate an organization\u2019s security posture and <\/span><span class=\"NormalTextRun SCXW24833761 BCX8\">identify<\/span><span class=\"NormalTextRun SCXW24833761 BCX8\"> vulnerabilities.<\/span><\/span><span class=\"EOP SCXW24833761 BCX8\" data-ccp-props=\"\">\u00a0<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-fbe1b8500d9d3fa5f fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color5);--awb-content-color:var(--awb-color7);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_fbe1b8500d9d3fa5f\"><a aria-expanded=\"false\" aria-controls=\"fbe1b8500d9d3fa5f\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1858-1\" data-target=\"#fbe1b8500d9d3fa5f\" href=\"#fbe1b8500d9d3fa5f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">How does Breach and Attack Simulation work? <\/span><\/a><\/h4><\/div><div id=\"fbe1b8500d9d3fa5f\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_fbe1b8500d9d3fa5f\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><span class=\"TextRun SCXW108890735 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW108890735 BCX8\">Breach and Attack Simulation works by conducting continuous, automated attack simulations that test the integrity of potential attack pathways within an organization\u2019s network. These simulations help in validating security controls, detecting vulnerabilities, and <\/span><span class=\"NormalTextRun SCXW108890735 BCX8\">providing<\/span><span class=\"NormalTextRun SCXW108890735 BCX8\"> actionable insights to enhance cybersecurity defenses.<\/span><\/span><span class=\"EOP SCXW108890735 BCX8\" data-ccp-props=\"\">\u00a0<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-011c6a8fe0cc1326f fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color5);--awb-content-color:var(--awb-color7);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_011c6a8fe0cc1326f\"><a aria-expanded=\"false\" aria-controls=\"011c6a8fe0cc1326f\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1858-1\" data-target=\"#011c6a8fe0cc1326f\" href=\"#011c6a8fe0cc1326f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What problems do BAS tools attempt to solve? <\/span><\/a><\/h4><\/div><div id=\"011c6a8fe0cc1326f\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_011c6a8fe0cc1326f\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><span class=\"NormalTextRun SCXW113302444 BCX8\">BAS tools aim to address critical cybersecurity challenges by providing organizations with a proactive approach to assess the effectiveness of their security programs. These tools help in <\/span><span class=\"NormalTextRun SCXW113302444 BCX8\">identifying<\/span><span class=\"NormalTextRun SCXW113302444 BCX8\"> security gaps, <\/span><span class=\"NormalTextRun SCXW113302444 BCX8\">validating<\/span><span class=\"NormalTextRun SCXW113302444 BCX8\"> security controls, and ensuring that organizations can withstand sophisticated cyber threats.<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-15b4263e0bbbfac19 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color5);--awb-content-color:var(--awb-color7);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_15b4263e0bbbfac19\"><a aria-expanded=\"false\" aria-controls=\"15b4263e0bbbfac19\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1858-1\" data-target=\"#15b4263e0bbbfac19\" href=\"#15b4263e0bbbfac19\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What are the different types of BAS solutions available? <\/span><\/a><\/h4><\/div><div id=\"15b4263e0bbbfac19\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_15b4263e0bbbfac19\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><span data-contrast=\"auto\">There are three main types of BAS solutions:<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Agent-based BAS solutions: Deploy agents across the LAN to identify vulnerabilities and assess potential attack routes.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">BAS solutions based on \u201cmalicious\u201d traffic: Generate intrusive traffic within the network to evaluate event detection and blocking capabilities.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cloud-based BAS solutions: Simulate multi-vector attacks from outside the network perimeter, leveraging the latest threat intelligence for up-to-date testing.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-ea196d61a22704a02 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color5);--awb-content-color:var(--awb-color7);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_ea196d61a22704a02\"><a aria-expanded=\"false\" aria-controls=\"ea196d61a22704a02\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1858-1\" data-target=\"#ea196d61a22704a02\" href=\"#ea196d61a22704a02\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">How can BAS benefit organizations? <\/span><\/a><\/h4><\/div><div id=\"ea196d61a22704a02\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ea196d61a22704a02\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><span data-contrast=\"auto\">Breach and Attack Simulation offers several benefits to organizations, including:<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Continuous validation of security control effectiveness.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Realistic testing of security architecture to reduce exposure risk.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Mitigation guidance to remediate vulnerabilities and enhance security posture.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Automation for scheduled and on-demand testing.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Identification of exposure to the latest active threats.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-bb43a712a7044626f fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color5);--awb-content-color:var(--awb-color7);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_bb43a712a7044626f\"><a aria-expanded=\"false\" aria-controls=\"bb43a712a7044626f\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-1858-1\" data-target=\"#bb43a712a7044626f\" href=\"#bb43a712a7044626f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">How does BAS differ from traditional security assessments? <\/span><\/a><\/h4><\/div><div id=\"bb43a712a7044626f\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_bb43a712a7044626f\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><span class=\"TextRun SCXW32753573 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW32753573 BCX8\">Breach and Attack Simulation differs from traditional security assessments like vulnerability scanning, penetration testing, and Red Teaming by providing a more sophisticated and automated evaluation of an organization\u2019s security defenses. BAS focuses on continuous testing, validation, and mitigation guidance to improve overall security posture.<\/span><\/span><span class=\"EOP SCXW32753573 BCX8\" data-ccp-props=\"\">\u00a0<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_6 1_6 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-bg-size:cover;--awb-width-large:16.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:10.368%;--awb-width-medium:16.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:23.04%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:center top;--awb-background-blend-mode:screen;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-background-color:var(--awb-color8);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-end fusion-flex-content-wrap\" style=\"max-width:calc( 1160px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:10%;--awb-padding-bottom:10%;--awb-padding-top-medium:0px;--awb-padding-bottom-medium:50px;--awb-padding-top-small:0px;--awb-padding-bottom-small:50px;--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:50%;--awb-order-medium:1;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:1;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.8\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.25;\">Talk To Us<\/h2><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-line-height:var(--awb-typography5-line-height);--awb-letter-spacing:var(--awb-typography5-letter-spacing);--awb-text-transform:var(--awb-typography5-text-transform);--awb-text-color:var(--awb-color1);--awb-text-font-family:var(--awb-typography5-font-family);--awb-text-font-weight:var(--awb-typography5-font-weight);--awb-text-font-style:var(--awb-typography5-font-style);\"><p>Penetration testing, cyber security strategy, proof-of-value, or just some information? Our domain experts provide bespoke cyber security offerings to solve your digital transformation challenges.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/firmussec.com\/sg\/contact\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Contact Us<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center fusion-no-small-visibility fusion-no-medium-visibility fusion-animated\" style=\"--awb-bg-position:right top;--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.8\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper lazyload fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column fusion-column-has-bg-image\" data-bg-url=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2022\/12\/Blade-red-firmus.png\" data-bg=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2022\/12\/Blade-red-firmus.png\"><ul style=\"--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;--awb-circlecolor:var(--awb-color5);--awb-circle-yes-font-size:14.08px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-home fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><span style=\"color: #ffffff;\"><strong>FIRMUS PTE LTD<\/strong><\/span><br \/>\n<span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/goo.gl\/maps\/1nEeYgLRboDZpApp8\" target=\"_blank\" rel=\"noopener\">20 McCallum Street #19-01,<br \/>\nTokio Marine Centre,<br \/>\nSingapore 069046.<\/a><\/span><\/p>\n<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-stretch fusion-no-large-visibility fusion-animated\" style=\"--awb-bg-position:right top;--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.8\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper lazyload fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-empty-column-bg-image fusion-column-has-bg-image\" data-bg-url=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2022\/12\/Blade-red-3.png\" data-bg=\"https:\/\/firmussec.com\/sg\/wp-content\/uploads\/2022\/12\/Blade-red-3.png\"><img decoding=\"async\" class=\"fusion-empty-dims-img-placeholder\" aria-label=\"Blade-red\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271200%27%20height%3D%27575%27%20viewBox%3D%270%200%201200%20575%27%3E%3Crect%20width%3D%271200%27%20height%3D%27575%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\"><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":1430,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-1858","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Improve Security with Breach and Attack Simulation Services | Firmus<\/title>\n<meta name=\"description\" content=\"Strengthen your security posture with Firmus&#039; advanced Breach and Attack Simulation Services. Identify vulnerabilities and enhance your defenses today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/breach-and-attack-simulation-bas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Improve Security with Breach and Attack Simulation Services | Firmus\" \/>\n<meta property=\"og:description\" content=\"Strengthen your security posture with Firmus&#039; advanced Breach and Attack Simulation Services. Identify vulnerabilities and enhance your defenses today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/firmussec.com\/sg\/our-services\/assessment\/breach-and-attack-simulation-bas\/\" \/>\n<meta property=\"og:site_name\" content=\"Penetration Testing Singapore | Top Pentest Services Expert\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/FIRMUSsec\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-04T04:31:41+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/our-services\\\/assessment\\\/breach-and-attack-simulation-bas\\\/\",\"url\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/our-services\\\/assessment\\\/breach-and-attack-simulation-bas\\\/\",\"name\":\"Improve Security with Breach and Attack Simulation Services | Firmus\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/#website\"},\"datePublished\":\"2023-01-11T14:11:15+00:00\",\"dateModified\":\"2024-06-04T04:31:41+00:00\",\"description\":\"Strengthen your security posture with Firmus' advanced Breach and Attack Simulation Services. Identify vulnerabilities and enhance your defenses today.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/our-services\\\/assessment\\\/breach-and-attack-simulation-bas\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/firmussec.com\\\/sg\\\/our-services\\\/assessment\\\/breach-and-attack-simulation-bas\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/our-services\\\/assessment\\\/breach-and-attack-simulation-bas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Services\",\"item\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/our-services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Assessment\",\"item\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/our-services\\\/assessment\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Breach and Attack Simulation (BAS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/#website\",\"url\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/\",\"name\":\"Penetration Testing Singapore | Top Pentest Services Expert\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/#organization\",\"name\":\"Penetration Testing Singapore | Top Pentest Services Expert\",\"url\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/dev\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/FIRMUS_Red-1.png\",\"contentUrl\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/dev\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/FIRMUS_Red-1.png\",\"width\":1244,\"height\":281,\"caption\":\"Penetration Testing Singapore | Top Pentest Services Expert\"},\"image\":{\"@id\":\"https:\\\/\\\/firmussec.com\\\/sg\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/FIRMUSsec\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/firmus-security\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Improve Security with Breach and Attack Simulation Services | Firmus","description":"Strengthen your security posture with Firmus' advanced Breach and Attack Simulation Services. Identify vulnerabilities and enhance your defenses today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/firmussec.com\/sg\/our-services\/assessment\/breach-and-attack-simulation-bas\/","og_locale":"en_US","og_type":"article","og_title":"Improve Security with Breach and Attack Simulation Services | Firmus","og_description":"Strengthen your security posture with Firmus' advanced Breach and Attack Simulation Services. Identify vulnerabilities and enhance your defenses today.","og_url":"https:\/\/firmussec.com\/sg\/our-services\/assessment\/breach-and-attack-simulation-bas\/","og_site_name":"Penetration Testing Singapore | Top Pentest Services Expert","article_publisher":"https:\/\/www.facebook.com\/FIRMUSsec\/","article_modified_time":"2024-06-04T04:31:41+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/firmussec.com\/sg\/our-services\/assessment\/breach-and-attack-simulation-bas\/","url":"https:\/\/firmussec.com\/sg\/our-services\/assessment\/breach-and-attack-simulation-bas\/","name":"Improve Security with Breach and Attack Simulation Services | Firmus","isPartOf":{"@id":"https:\/\/firmussec.com\/sg\/#website"},"datePublished":"2023-01-11T14:11:15+00:00","dateModified":"2024-06-04T04:31:41+00:00","description":"Strengthen your security posture with Firmus' advanced Breach and Attack Simulation Services. Identify vulnerabilities and enhance your defenses today.","breadcrumb":{"@id":"https:\/\/firmussec.com\/sg\/our-services\/assessment\/breach-and-attack-simulation-bas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/firmussec.com\/sg\/our-services\/assessment\/breach-and-attack-simulation-bas\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/firmussec.com\/sg\/our-services\/assessment\/breach-and-attack-simulation-bas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/firmussec.com\/sg\/"},{"@type":"ListItem","position":2,"name":"Our Services","item":"https:\/\/firmussec.com\/sg\/our-services\/"},{"@type":"ListItem","position":3,"name":"Assessment","item":"https:\/\/firmussec.com\/sg\/our-services\/assessment\/"},{"@type":"ListItem","position":4,"name":"Breach and Attack Simulation (BAS)"}]},{"@type":"WebSite","@id":"https:\/\/firmussec.com\/sg\/#website","url":"https:\/\/firmussec.com\/sg\/","name":"Penetration Testing Singapore | Top Pentest Services Expert","description":"","publisher":{"@id":"https:\/\/firmussec.com\/sg\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/firmussec.com\/sg\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/firmussec.com\/sg\/#organization","name":"Penetration Testing Singapore | Top Pentest Services Expert","url":"https:\/\/firmussec.com\/sg\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/firmussec.com\/sg\/#\/schema\/logo\/image\/","url":"https:\/\/firmussec.com\/sg\/dev\/wp-content\/uploads\/2022\/12\/FIRMUS_Red-1.png","contentUrl":"https:\/\/firmussec.com\/sg\/dev\/wp-content\/uploads\/2022\/12\/FIRMUS_Red-1.png","width":1244,"height":281,"caption":"Penetration Testing Singapore | Top Pentest Services Expert"},"image":{"@id":"https:\/\/firmussec.com\/sg\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/FIRMUSsec\/","https:\/\/www.linkedin.com\/company\/firmus-security\/"]}]}},"_links":{"self":[{"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/pages\/1858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/comments?post=1858"}],"version-history":[{"count":5,"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/pages\/1858\/revisions"}],"predecessor-version":[{"id":3483,"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/pages\/1858\/revisions\/3483"}],"up":[{"embeddable":true,"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/pages\/1430"}],"wp:attachment":[{"href":"https:\/\/firmussec.com\/sg\/wp-json\/wp\/v2\/media?parent=1858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}