Author:Veerasamy, NamoshaDate:Dec 2009This paper proposes a combined Red and Blue Team Methodology to guide the process of carrying out such security auditing and penetration testing tasks. Red and Blue Teams consist of various security auditing and penetration testing tasks which ...Read more
Author:Mouton, F; Malan, MM; Kimppa, KK; Venter, HSDate:Nov 2015Social engineering is deeply entrenched in the fields of both computer science and social psychology. Knowledge is required in both these disciplines to perform social engineering based research. Several ethical concerns and requirements need ...Read more