A command and control approach to red teaming
<p>As the military has to react and respond to cyber attacks, they also are having to develop a way to apply cyber operations to the command and control hierarchy already in use. This thesis studies the requirements for a cyber command and control (C3) and conducts an experiment to test whethe...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en |
Published: |
MSSTATE
2014
|
Subjects: | |
Online Access: | http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292014-215711/ |
id |
ndltd-MSSTATE-oai-library.msstate.edu-etd-10292014-215711 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-MSSTATE-oai-library.msstate.edu-etd-10292014-2157112015-03-17T15:55:00Z A command and control approach to red teaming Haynes, Kaitlin Britt Computer Science and Engineering <p>As the military has to react and respond to cyber attacks, they also are having to develop a way to apply cyber operations to the command and control hierarchy already in use. This thesis studies the requirements for a cyber command and control (C3) and conducts an experiment to test whether a C3 approach to red teaming helps users find more vulnerabilities. Since red teaming is similar in setting to the cyber operations setting, if the team finds that a C3 helps team members find more vulnerabilities, then a C3 environment can help the military better respond to cyber attacks. As a result of the experiment, the control team and the team using the C3 tied. However, participants surveyed indicated that using a C3 environment was more helpful than not using the C3 environment.</p> Dr. David Dampier Dr. Robert Wesley McGrew Dr. Byron J. Williams MSSTATE 2014-11-24 text application/pdf http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292014-215711/ http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292014-215711/ en unrestricted I hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, Dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to Mississippi State University Libraries or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, Dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, Dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, Dissertation, or project report. |
collection |
NDLTD |
language |
en |
format |
Others
|
sources |
NDLTD |
topic |
Computer Science and Engineering |
spellingShingle |
Computer Science and Engineering Haynes, Kaitlin Britt A command and control approach to red teaming |
description |
<p>As the military has to react and respond to cyber attacks, they also are having to develop
a way to apply cyber operations to the command and control hierarchy already in
use. This thesis studies the requirements for a cyber command and control (C3) and conducts
an experiment to test whether a C3 approach to red teaming helps users find more
vulnerabilities. Since red teaming is similar in setting to the cyber operations setting, if the
team finds that a C3 helps team members find more vulnerabilities, then a C3 environment
can help the military better respond to cyber attacks. As a result of the experiment, the
control team and the team using the C3 tied. However, participants surveyed indicated that
using a C3 environment was more helpful than not using the C3 environment.</p> |
author2 |
Dr. David Dampier |
author_facet |
Dr. David Dampier Haynes, Kaitlin Britt |
author |
Haynes, Kaitlin Britt |
author_sort |
Haynes, Kaitlin Britt |
title |
A command and control approach to red teaming |
title_short |
A command and control approach to red teaming |
title_full |
A command and control approach to red teaming |
title_fullStr |
A command and control approach to red teaming |
title_full_unstemmed |
A command and control approach to red teaming |
title_sort |
command and control approach to red teaming |
publisher |
MSSTATE |
publishDate |
2014 |
url |
http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292014-215711/ |
work_keys_str_mv |
AT hayneskaitlinbritt acommandandcontrolapproachtoredteaming AT hayneskaitlinbritt commandandcontrolapproachtoredteaming |
_version_ |
1716732263391035392 |