Date of Graduation

5-2025

Document Type

Thesis

Degree Name

Bachelor of Science in Computer Science

Degree Level

Undergraduate

Department

Computer Science and Computer Engineering

Advisor/Mentor

Panda, Brajendra Nath

Committee Member

Ngan Le, Thi Hoang

Second Committee Member

Li, Qinghua

Abstract

The purpose of this paper is to present a framework for selecting between two methods of Automated Adversary Emulation (AAE). As IT systems become increasingly complex and interconnected, adopting a zero-trust mindset of cybersecurity is essential. This mindset extends to cybersecurity testing, where a combined offensive/defensive approach ("purple teaming") can utilize adversary emulation to uncover vulnerabilities efficiently and effectively. While AAE is rapidly gaining traction across various industries and applications, there is limited guidance in the current literature on how to choose the optimal method for different testing scenarios. This paper defines two common approaches to AAE and examines eight key variables to consider when selecting the most suitable method. To illustrate the framework, a small test of web application vulnerabilities is conducted, demonstrating how the framework provides valuable guidance in choosing the appropriate AAE method for a given scenario.

Keywords

cybersecurity

Included in

Engineering Commons

Share

COinS