Teams in Cybersecurity

ByFelez

Uzman üye
9 Tem 2013
1,818
1,774
The world of information security is constantly expanding, and the concept of penetration testing is gaining more and more popularity. So, what are the teams that are created during or after testing? The team, often called the Red team, aims to attack, the Blue team aims to defend, and the Purple team aims to combine the skills of the Red and Blue team by supporting the processes.


uR0jPF.png



What is the Red and Blue Team? What is the Difference between them?
The Red Team is actually a concept that originated long before penetration testing. The goal is to test vulnerabilities that illustrate how the company's important data can be attacked in real life, and also to contribute to the development of defense, as well as improving attackers' skills. This idea has been transformed into War Games by the Blue Team, where the defender and the attacker take on the role of Red Team, and started to be used in information security.

In fact, despite his offensive nature, the Red Team is an excellent defender. It allows organizations to better defend themselves against real hacker attacks by simulating precision.


kapak-1-800x800.jpg



Red Team services are mainly used by large companies that have already undergone similar security audits and provide services in data storage, finance and similar fields (banks, providers, IT companies). These inspections are done more rigorously and take more time than a test. Because of such hard work, the specialist must know more than a statistical penformer and understand the principle of operation of the object under test, because more and more there is a team that specializes only in scenarios and utilities.

Although the Red Team is not permanent, the Blue Team is usually part of the SOC. Using various utilities, the S ecurity O peration Center analyzes network traffic, reacts to attacks, and tries to prevent and predict them in some way.

In fact, there are not only these 2 sets for cyber security. In some cases, the effort of both teams requires the support of the Purple Team.


uR0jPF.png



Team Red and Blue work together to provide complete control. The red team provides detailed logs of all operations performed. The blue team fully documents all corrective actions taken to resolve any issues found during testing. The Purple Team is a concept that has started to be heard in the security world in the last few years. The Purple Team may be a consulting group that is hired to conduct an audit or direct execution of the company's employees, but their job is not to focus solely on attack or defense.



How is the Red Team different from the Penetration test?
Penetration testing basically checks networks, web services, and systems for vulnerabilities. In addition, the penetration test checks the wireless access points separately.

The Red Team also tries to take advantage of the weaknesses and get inside / get information. For example, a penetration test uses a variety of browsers and manual skill. But Red Teaming uses skills like social engineering, getting unauthorized physical access, zero-day vulnerability finding, and so on.

That is, the Red Team not only executes a full audit of the web application / server and finds vulnerabilities, but also specializes in carrying out a multi-layered attack, etc.


uR0jPF.png



iUBacd.gif
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.