Red Team Operations to Assess Information Technology Vulnerabilities