Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 67, 2023 - Issue 5
186
Views
0
CrossRef citations to date
0
Altmetric
Research Article

OFFENSE FOR DEFENSE: THE ART AND SCIENCE OF CYBERSECURITY RED TEAMING

References

  • Applebaum, A., Miller, D., Strom, B., Korban, C., & Wolf, R. (2016). Intelligent, automated red team emulation. In Proceedings of the 32nd Annual Conference on Computer Security Applications. https://doi.org/10.1145/2991079.2991111
  • Carey, M. J., & Jin, J. (2019). Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity. John Wiley & Sons.
  • Everson, D. A. C. L. (2020). Network attack surface simplification for red and blue teams.
  • Han, X., Kheir, N., & Balzarotti, D. (2018). Deception techniques in computer security: A research perspective. ACM Computing Surveys, 51(4), Article 80. https://doi.org/10.1145/3214305
  • Kovačević, I., & Groš, S. (2020). Pentesters, APTs, or neither. In 43rd International Convention on Information, Communication and Electronic Technology (MIPRO).
  • Veerasamy, N. (2009). ”High-Level Methodology for Carrying out Combined Red and Blue Teams.“ 2009 Second International Conference on Computer and Electrical Engineering, Dubai, United Arab Emirates, pp. 416–420. https://doi.org/10.1109/ICCEE.2009.177

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.