dc.contributor.author |
Veerasamy, Namosha
|
|
dc.date.accessioned |
2010-03-02T14:43:59Z |
|
dc.date.available |
2010-03-02T14:43:59Z |
|
dc.date.issued |
2009-12 |
|
dc.identifier.citation |
Veerasamy, N. 2009. High-level methodology for carrying out combined red and blue teams. 2nd International Conference on Computer and Electrical Engineering (ICCEE 2009), Dubai. 28-30 December 2009, pp 416-420 |
en |
dc.identifier.isbn |
978-0-7695-3925-6 |
|
dc.identifier.uri |
http://doi.ieeecomputersociety.org/10.1109/ICCEE.2009.177
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/3968
|
|
dc.description |
Copyright: 2009 IEEE. 2nd International Conference on Computer and Electrical Engineering (ICCEE), Dubai, 28-30 December 2009 |
en |
dc.description.abstract |
This paper proposes a combined Red and Blue Team Methodology to guide the process of carrying out such security auditing and penetration testing tasks. Red and Blue Teams consist of various security auditing and penetration testing tasks which serve to determine the current security baseline in an organisation. The practice of Red and Blue Teams has demonstrated that various data gathering, assessment and technological based activities form the foundation. In this way, the different activities were organised so as to structure and guide the execution of a combined Red and Blue Team. |
en |
dc.language.iso |
en |
en |
dc.publisher |
IEEE |
en |
dc.subject |
Penetration testing |
en |
dc.subject |
Red teams |
en |
dc.subject |
Security audit |
en |
dc.subject |
Blue teams |
en |
dc.title |
High-level methodology for carrying out combined red and blue teams |
en |
dc.type |
Article |
en |
dc.identifier.apacitation |
Veerasamy, N. (2009). High-level methodology for carrying out combined red and blue teams. http://hdl.handle.net/10204/3968 |
en_ZA |
dc.identifier.chicagocitation |
Veerasamy, Namosha "High-level methodology for carrying out combined red and blue teams." (2009) http://hdl.handle.net/10204/3968 |
en_ZA |
dc.identifier.vancouvercitation |
Veerasamy N. High-level methodology for carrying out combined red and blue teams. 2009; http://hdl.handle.net/10204/3968. |
en_ZA |
dc.identifier.ris |
TY - Article
AU - Veerasamy, Namosha
AB - This paper proposes a combined Red and Blue Team Methodology to guide the process of carrying out such security auditing and penetration testing tasks. Red and Blue Teams consist of various security auditing and penetration testing tasks which serve to determine the current security baseline in an organisation. The practice of Red and Blue Teams has demonstrated that various data gathering, assessment and technological based activities form the foundation. In this way, the different activities were organised so as to structure and guide the execution of a combined Red and Blue Team.
DA - 2009-12
DB - ResearchSpace
DP - CSIR
KW - Penetration testing
KW - Red teams
KW - Security audit
KW - Blue teams
LK - https://researchspace.csir.co.za
PY - 2009
SM - 978-0-7695-3925-6
T1 - High-level methodology for carrying out combined red and blue teams
TI - High-level methodology for carrying out combined red and blue teams
UR - http://hdl.handle.net/10204/3968
ER -
|
en_ZA |