Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Red Team

Handbook of Research on Serious Games as Educational, Business and Research Tools
The group of IT professionals, faculty and graduate students that tests each Blue Team network for vulnerabilities and plays the role of attackers in the competition. Their job is to actively network scans and actively penetration testing against the Blue Teams’ networks. Once vulnerabilities are found, the Red Team may act on those to gain access to the servers of interest. First, they must capture the flag on that server to prove that they have access to the box. Then, once they have the flag, they can reconfigure it, install additional software on it, install a virus on it or take any variety of steps that an attacker might take on a production server.
Published in Chapter:
Cyber Defense Competitions as Learning Tools: Serious Applications for Information Warfare Games
Julie A. Rursch (Iowa State University, USA) and Doug Jacobson (Iowa State University, USA)
DOI: 10.4018/978-1-4666-0149-9.ch004
Abstract
In a cyber defense competition, students design, configure, and maintain a set of servers and a network in a secure manner. The students’ goal during the competition is to prevent security breaches and to remediate any exploits that occur while maintaining a fully functional network for their end users. Cyber defense competitions provide active student learning, mimic real-world situations, and provide engagement with computer and network security topics. To date, Iowa State University has hosted 18 cyber defense competitions across four divisions: high school students, community college students, ISU students, and four-year university students from across the nation. This chapter provides a brief history of cyber defense competitions, as well as describes how they are run. The authors also address the needs of different audiences who participate in cyber defense competitions and show that beyond building and strengthening computer and network security skills, cyber defense competitions can be used for recruitment, retention, advanced training, and experimentation for students.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR