Issue No. 04 - July-August (2004 vol. 2)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2004.58
Greg White , The University of Texas at San Antonio
Art Conklin , The University of Texas at San Antonio
Over time, network threats change, the network configuration changes, and a computer network defense system must be periodially tested. Red teams are a popular method, but in many cases, proceeding too quickly can be counterproductive when what is really needed is a less intense experience.
force on force, red team, cyber test
A. Conklin and G. White, "The Appropriate Use of Force-on-Force Cyberexercises," in IEEE Security & Privacy, vol. 2, no. , pp. 33-37, 2004.