Preview

Red Teaming The Art Of War Gaming Case Study

Good Essays
Open Document
Open Document
730 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Red Teaming The Art Of War Gaming Case Study
Red Teaming: The Art of War Gaming – part 1

What is a Red Team?
Red Team is a process designed to measure the current security state of an organization in term of physical, logical and social factors and improve them in a continues basis. Red Team exercise involves continues challenge to the existing defense ability and upgrade them to counter the real attack if happens in future. They mimic the behavior of an attacker in order to developing the security of an organization.
Purpose of Red Team
The goal of deploying a Red Team is to improve the overall security control system of an organization.
- Identifying the vulnerability within the organization in physical, logical and social areas.
- Utilizing the security flaws to gather more information,
…show more content…
- Continues war gaming improves the overall security system of the organization
- Improves the ability of existing incident response team etc. to defend a real time cyber-attack in future.
- Improves the organizational incident handling and recovery mechanism to ‘restore the business in time’ at the time of real cyber-attack.
Scope of Red Team Exercise
Defining the scope of the Red teaming exercise is the most important task before an organization deploys the Red team into their environment. Most of the times, it is very specific when determining what are the subjects to be included or excluded in the Red teaming exercise. There are multiple factors including the organization size, number of offices, number of assets, services etc.
There are mainly three areas where the Red team has interest into:
1. The Physical Element
2. The Digital Element and
3. The Social Element or Human Factors

1. Physical Part
Integrated physical security from perimeter to control room is to detect and prevent an intrusion to the organization. There are many aspects part of Physical security including the
…show more content…
However, there is a clear difference between these two approaches.
Penetration testing is designed specifically to identify the existing vulnerabilities in the target organization and then trying to exploit them to gain access, extract maximum possible sensitive information in a way an attacker would do. The final result will reflect the deep analysis of business risk poses to the organization by showcasing the process of how can attacker could d extract critical business information by exploiting the existing one or more vulnerabilities.
Penetration testing is a part of Red team exercise. Red teaming is one step ahead of Penetrating testing. It is designed to map the overall security posture of the target organization by all mean (physical, digital and social). Red teaming exercise refines the existing security strategy and performance of the target organization and improves them to the next level by conducting continues planned or ad-hoc security exercise. It helps the organization to examine their current capability and improves their readiness to defend the real time attack if happens at any time.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Penetration testing should be done to test the network for vulnerabilities. There are several types of penetration testing. “An automated port based scan is generally one of the first steps in a traditional penetration test because it helps obtain a basic overview of what may be available on the target network or host. Port based scanners check to determine whether a port on a remote host is able to receive a connection. Generally, this will involve the protocols which utilize IP (such as TCP, UDP, ICMP, etc.), However, ports on other network protocols could be present as well dependent on the environment (for example, it’s quite common in large mainframe environments for SNA to be in use). Typically, a port can have one of two possible states: open – the port is able to receive data and closed – the port is not able to receive data. A service based vulnerability scanner is one which utilizes specific protocols to communicate with open ports on a remote host, to determine…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110: Unit 1 Role Scenario 1) Identify threats to the seven domains of IT within the organization: A. User: Destroy data B. Workstation: Loss of data, not updated C. LAN: Unauthorized user, weak password D. LAN –WAN: Hackers, weak traffic filtering E. WAN- FTP anon uploads, DoS/DDoS F. System Application: Fire, DoS/DDoS, SQL injection corrupting data G. Remote: user virus, remote from office unsecure, VPN tunnel hack 2) Identify vulnerabilities in the seven domains of IT within the organization. A. User: Infected media, social engineering B. Workstation: OS vulnerability, browser vulnerability C. LAN: Worms, LAN OS vulnerability D. LAN-WAN: malicious websites, unblocked ports E. WAN: network outages F. System Application: ISP…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Answers Nessus

    • 628 Words
    • 3 Pages

    This lab demonstrates the first 3 steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found in order to exploit the vulnerability.…

    • 628 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    There are several steps that need to take place while planning and executing a penetration test. The first is the planning and preparation stage. During this stage, penetration testers and management personnel should hold a meeting to determine the exact scope, goals, and method of the penetration test. Failure to do this will only result in a list of exploitable vulnerabilities without any type of prioritization or guidelines for the organization. Since these tests can cause networks to crash or connectivity to slow tremendously, it is very important the penetration testers know what kinds of tests are and are not acceptable to management. Legal documents should also be drafted during this time to protect the penetration testers. Since the testing involves acts that would normally be illegal and could compromise confidential information, these documents can outline how the information will be handled, returned and/or destroyed. A liability waiver should also be included to protect the testers from and ramifications of any system damage during the test.…

    • 591 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Communications Plan

    • 672 Words
    • 4 Pages

    Team Name, Mission Statement, Communications and Conflict Resolution Plan, Pt1 and Mini-project Plan for Case Analysis Study 1…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Educare Ltd Project Report

    • 3316 Words
    • 14 Pages

    The RM will disseminate to all the teams their area of responsibility to track and monitor risk. This will be done in conjunction with the team’s job function as they are experts in their field and able to deal with it effectively.…

    • 3316 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Ensure Team Effectiveness

    • 288 Words
    • 2 Pages

    This will help me to determine optimal team deployment, measure performance (forming, storming, norming, performing). Once this is completed, I will have a better picture of any problems that need to be…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Individual Contribution

    • 500 Words
    • 2 Pages

    Each individual in a team has their own strengths and weaknesses. When learning teams are properly structured and everyone is contributing 100 percent, it can be an effective method of developing skills and sharpening existing ones. Within this paper, I will summarize my individual contribution to the team project and evaluate the effectiveness of my contribution to the success of the team project. Additionally, I will identify the areas where I believe additional training and more opportunities to practice would be helpful.…

    • 500 Words
    • 2 Pages
    Good Essays
  • Good Essays

    3- In response team. He hires a pool of talented and diverse group in order to deal with the critical and time sensitive issues who are not easy to be found. As Weafer, Said “it’s not as if colleges are creating thousands of anti-malware or security experts every year that we can hire. If you find them in any part of the world. You just go after them”. (technical skills)…

    • 815 Words
    • 4 Pages
    Good Essays