Summary: | <p>As the military has to react and respond to cyber attacks, they also are having to develop
a way to apply cyber operations to the command and control hierarchy already in
use. This thesis studies the requirements for a cyber command and control (C3) and conducts
an experiment to test whether a C3 approach to red teaming helps users find more
vulnerabilities. Since red teaming is similar in setting to the cyber operations setting, if the
team finds that a C3 helps team members find more vulnerabilities, then a C3 environment
can help the military better respond to cyber attacks. As a result of the experiment, the
control team and the team using the C3 tied. However, participants surveyed indicated that
using a C3 environment was more helpful than not using the C3 environment.</p>
|