This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Appropriate Use of Force-on-Force Cyberexercises
July-August 2004 (vol. 2 no. 4)
pp. 33-37
Greg White, The University of Texas at San Antonio
Art Conklin, The University of Texas at San Antonio
Over time, network threats change, the network configuration changes, and a computer network defense system must be periodially tested. Red teams are a popular method, but in many cases, proceeding too quickly can be counterproductive when what is really needed is a less intense experience.
Index Terms:
force on force, red team, cyber test
Citation:
Greg White, Art Conklin, "The Appropriate Use of Force-on-Force Cyberexercises," IEEE Security & Privacy, vol. 2, no. 4, pp. 33-37, July-Aug. 2004, doi:10.1109/MSP.2004.58
Usage of this product signifies your acceptance of the Terms of Use.