Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Breaking Blue:Automated Red Teaming Using Evolvable Simulations

We continue to develop a complementary approach to manual Red Teaming we call AutoRedTeaming, which uses a combination of evolutionary algorithms and agent-based simulations to generate novel solutions that ‘break Blue’. Information obtained during this automated process can then be used to either enhance or assist the manual effort. During the past year we have conducted the first test of the ...

متن کامل

Collaborative Red Teaming for Anonymity System Evaluation

This paper describes our experiences as researchers and developers during red teaming exercises of the SAFEST anonymity system. We argue that properly evaluating an anonymity system — particularly one that makes use of topological information and diverse relay selection strategies, as does SAFEST— presents unique challenges that are not addressed using traditional red teaming techniques. We pre...

متن کامل

Introduction to Cyber Warfare and Cyber Terrorism

The number of publicized terrorist attacks started to escalate beginning in the mid-1990s. From the attacks that received wide coverage by the world press, we have arrived to the point where not a single day passes without a terrorist committing such acts. It is the spectacular that is getting first-page coverage by the mass media. The basic mechanics of these attacks is usually through the use...

متن کامل

Analysis of Key Installation Protection using Computerized Red Teaming

This paper describes the use of genetic algorithms (GAs) for computerized red teaming applications, to explore options for military plans in specific scenarios. A tool called Optimized Red Teaming (ORT) is developed and we illustrate how it may be utilized to assist the red teaming process in security organizations, such as military forces. The developed technique incorporates a genetic algorit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Strategic Security

سال: 2013

ISSN: 1944-0464,1944-0472

DOI: 10.5038/1944-0472.6.3s.1