Title
Red Team Operations to Assess Information Technology Vulnerabilities
Author
Veltman, M.
Parker, R.L.
TNO Fysisch en Elektronisch Laboratorium
Contributor
Bosch, J.M.J. (editor)
Luiijf, H.A.M. (editor)
Mollema, A.R. (editor)
Publication year
1999
Abstract
All Information and Communication Technology (ICT) systems have vulnerabilities. Weaknesses in these systems are introduced either during the specification, implementation or operational phase. Leaving aside these introduced vulnerabilities are intentional or unintentional, the fact remains that these factors make information security as strong as its weakest link. A team of professionals - a red team - whose aim is to combine the required technical skills into practice - pinpoints and tracks these vulnerabilities. The first step in a red team analysis is the collection of information, followed by an onsite analysis, resulting in a complete and accessible report. The tools and techniques used by the highly skilled red teams are the same hackers use on today's computer and network environments supplemented with their own developed tools and techniques. Experiences leam that the development of methods and the maintenance of a cooperative relationship with the responsible staff are crucial in the raising of a professional coherent red team.
Subject
Red team
Vulnerability
Information systems
Information technology
To reference this document use:
http://resolver.tudelft.nl/uuid:ec450238-1949-4a80-ac1e-f9610d85db84
TNO identifier
95234
Publisher
Royal Netherlands Military Academy, Breda
Source
NLARMS - Netherlands Annual Review of Military Studies 1999 - Information Operations, 155-170
Document type
bookPart