Issue No. 04 - July-August (2004 vol. 2)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2004.58
Art Conklin , The University of Texas at San Antonio
Greg White , The University of Texas at San Antonio
Over time, network threats change, the network configuration changes, and a computer network defense system must be periodially tested. Red teams are a popular method, but in many cases, proceeding too quickly can be counterproductive when what is really needed is a less intense experience.
force on force, red team, cyber test
Art Conklin, Greg White, "The Appropriate Use of Force-on-Force Cyberexercises", IEEE Security & Privacy, vol. 2, no. , pp. 33-37, July-August 2004, doi:10.1109/MSP.2004.58