No Simulation Filter
Monitor the communication of a target person
Σ
$

%
Install spyware on target person's machine
0.0$ | 90%
2.0 |
1000.0$ | 30%

%
Trick target person with Spear-Phishing mail
100.0$ | 80%
2.0 |
10000.0$ | 60%

%
Infect the target's machine from a frequently used website (Watering Hole)
5000.0$ | 60%
3.0 |
10000.0$ | 70%

%
Install hardware keylogger on the target person's machine
100.0$ | 100%
1.0 |
3000.0$ | 20%

%
Gain Physical access to the target person's office
0.0$ | 50%
0.0 |
10000.0$ | 90%

%
Locate the target person's machine
0.0$ | 50%
0.0 |
0.0$ | 0%

%