What happens if an AET is used against an organization’s network? What is the worst case scenario?
AETs are dependent upon a vulnerable host inside the network. But with AETs, the full set of exploits can be tested without fear of detection. An exploit delivered successfully by an AET would allow for the loss of classified information, financial data or intellectual property. This would have a significant financial toll due to lost reputation, system downtime, data breach notification requirements, credit monitoring costs, fraudulent financial transactions and lost business.