A command and control approach to red teaming

<p>As the military has to react and respond to cyber attacks, they also are having to develop a way to apply cyber operations to the command and control hierarchy already in use. This thesis studies the requirements for a cyber command and control (C3) and conducts an experiment to test whethe...

Full description

Bibliographic Details
Main Author: Haynes, Kaitlin Britt
Other Authors: Dr. David Dampier
Format: Others
Language:en
Published: MSSTATE 2014
Subjects:
Online Access:http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292014-215711/
Description
Summary:<p>As the military has to react and respond to cyber attacks, they also are having to develop a way to apply cyber operations to the command and control hierarchy already in use. This thesis studies the requirements for a cyber command and control (C3) and conducts an experiment to test whether a C3 approach to red teaming helps users find more vulnerabilities. Since red teaming is similar in setting to the cyber operations setting, if the team finds that a C3 helps team members find more vulnerabilities, then a C3 environment can help the military better respond to cyber attacks. As a result of the experiment, the control team and the team using the C3 tied. However, participants surveyed indicated that using a C3 environment was more helpful than not using the C3 environment.</p>