Veerasamy, Namosha2010-03-022010-03-022009-12Veerasamy, N. 2009. High-level methodology for carrying out combined red and blue teams. 2nd International Conference on Computer and Electrical Engineering (ICCEE 2009), Dubai. 28-30 December 2009, pp 416-420978-0-7695-3925-6http://doi.ieeecomputersociety.org/10.1109/ICCEE.2009.177http://hdl.handle.net/10204/3968Copyright: 2009 IEEE. 2nd International Conference on Computer and Electrical Engineering (ICCEE), Dubai, 28-30 December 2009This paper proposes a combined Red and Blue Team Methodology to guide the process of carrying out such security auditing and penetration testing tasks. Red and Blue Teams consist of various security auditing and penetration testing tasks which serve to determine the current security baseline in an organisation. The practice of Red and Blue Teams has demonstrated that various data gathering, assessment and technological based activities form the foundation. In this way, the different activities were organised so as to structure and guide the execution of a combined Red and Blue Team.enPenetration testingRed teamsSecurity auditBlue teamsHigh-level methodology for carrying out combined red and blue teamsArticleVeerasamy, N. (2009). High-level methodology for carrying out combined red and blue teams. http://hdl.handle.net/10204/3968Veerasamy, Namosha "High-level methodology for carrying out combined red and blue teams." (2009) http://hdl.handle.net/10204/3968Veerasamy N. High-level methodology for carrying out combined red and blue teams. 2009; http://hdl.handle.net/10204/3968.TY - Article AU - Veerasamy, Namosha AB - This paper proposes a combined Red and Blue Team Methodology to guide the process of carrying out such security auditing and penetration testing tasks. Red and Blue Teams consist of various security auditing and penetration testing tasks which serve to determine the current security baseline in an organisation. The practice of Red and Blue Teams has demonstrated that various data gathering, assessment and technological based activities form the foundation. In this way, the different activities were organised so as to structure and guide the execution of a combined Red and Blue Team. DA - 2009-12 DB - ResearchSpace DP - CSIR KW - Penetration testing KW - Red teams KW - Security audit KW - Blue teams LK - https://researchspace.csir.co.za PY - 2009 SM - 978-0-7695-3925-6 T1 - High-level methodology for carrying out combined red and blue teams TI - High-level methodology for carrying out combined red and blue teams UR - http://hdl.handle.net/10204/3968 ER -