De grootste kennisbank van het HBO

Inspiratie op jouw vakgebied

Vrij toegankelijk

Terug naar zoekresultatenDeel deze publicatie

Red team operations to assess information technology vulnerabilities

Open access

Rechten:

Red team operations to assess information technology vulnerabilities

Open access

Rechten:

Samenvatting

All Information and Communication Technology (ICT) systems have vulnerabilities. Weakness in these systems are introduced either during the specification, implementation or operational phase. Leaving aside these introduced vulnerabilities are intentional, the fact remains that these factors make information security as strong as its weakest link. A team of professionals - a red team- whose aim is to combine the required technical skills into practise - pinpoints and tracks these vulnerabilities. The first step in a red team analysis is the collection of information, followed by an onsite analysis, resulting in a complete and accessible report. The tools and techniques used by the highly skilled red teams are the same hackers use on today's computer and network environments supplemented with their own developed tools and techniques. Experiences learn that the development of methods and the maintenance of a cooperative relationship with the responsible staff are crucial in the raising of a professioanl coherent red team.

Toon meer
Gepubliceerd inInformation operations Royal Netherlands Military Academy, Breda, Vol. 1999, Pagina's: 155-170
Jaar1999
TypeAndersoortig materiaal
TaalEngels

Op de HBO Kennisbank vind je publicaties van 26 hogescholen

De grootste kennisbank van het HBO

Inspiratie op jouw vakgebied

Vrij toegankelijk