Sponsored Links
-->

Monday, January 1, 2018

Red Teams, Blue Teams, and Purple Teaming: An Assessment of Value ...
src: s-media-cache-ak0.pinimg.com

A blue team is a group of individuals who perform an analysis of information systems to ensure security, identify security flaws, verify the effectiveness of each security measure, and to make certain all security measures will continue to be effective after implementation.


Video Blue team (computer security)



History

As part of the United States computer security defense initiative, red teams were developed to exploit other malicious entities that would do them harm. As a result, blue teams were developed to design defensive measures against such red team activities.


Maps Blue team (computer security)



Incident Response

If an incident does occur within the organization, the blue team will perform the follow six steps to handle the situation:

  1. Preparation
  2. Identification
  3. Containment
  4. Eradication
  5. Recovery
  6. Lessons learned

Operating system hardening

In preparation for a computer security incident, the blue team will perform hardening (computing) techniques on all operating systems throughout the organization.

Perimeter defense

The blue team must always be mindful of the network perimeter, including traffic flow, packet filtering, proxy firewalls, and intrusion detection systems.


Russia hopes U.S. will set up team for dialogue on cyber security ...
src: cdni.rbth.com


See also


Casper Schellekens on Twitter:
src: pbs.twimg.com


References

Source of article : Wikipedia