A command and control approach to red teaming

<p>As the military has to react and respond to cyber attacks, they also are having to develop a way to apply cyber operations to the command and control hierarchy already in use. This thesis studies the requirements for a cyber command and control (C3) and conducts an experiment to test whethe...

Full description

Bibliographic Details
Main Author: Haynes, Kaitlin Britt
Other Authors: Dr. David Dampier
Format: Others
Language:en
Published: MSSTATE 2014
Subjects:
Online Access:http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292014-215711/
id ndltd-MSSTATE-oai-library.msstate.edu-etd-10292014-215711
record_format oai_dc
spelling ndltd-MSSTATE-oai-library.msstate.edu-etd-10292014-2157112015-03-17T15:55:00Z A command and control approach to red teaming Haynes, Kaitlin Britt Computer Science and Engineering <p>As the military has to react and respond to cyber attacks, they also are having to develop a way to apply cyber operations to the command and control hierarchy already in use. This thesis studies the requirements for a cyber command and control (C3) and conducts an experiment to test whether a C3 approach to red teaming helps users find more vulnerabilities. Since red teaming is similar in setting to the cyber operations setting, if the team finds that a C3 helps team members find more vulnerabilities, then a C3 environment can help the military better respond to cyber attacks. As a result of the experiment, the control team and the team using the C3 tied. However, participants surveyed indicated that using a C3 environment was more helpful than not using the C3 environment.</p> Dr. David Dampier Dr. Robert Wesley McGrew Dr. Byron J. Williams MSSTATE 2014-11-24 text application/pdf http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292014-215711/ http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292014-215711/ en unrestricted I hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, Dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to Mississippi State University Libraries or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, Dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, Dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, Dissertation, or project report.
collection NDLTD
language en
format Others
sources NDLTD
topic Computer Science and Engineering
spellingShingle Computer Science and Engineering
Haynes, Kaitlin Britt
A command and control approach to red teaming
description <p>As the military has to react and respond to cyber attacks, they also are having to develop a way to apply cyber operations to the command and control hierarchy already in use. This thesis studies the requirements for a cyber command and control (C3) and conducts an experiment to test whether a C3 approach to red teaming helps users find more vulnerabilities. Since red teaming is similar in setting to the cyber operations setting, if the team finds that a C3 helps team members find more vulnerabilities, then a C3 environment can help the military better respond to cyber attacks. As a result of the experiment, the control team and the team using the C3 tied. However, participants surveyed indicated that using a C3 environment was more helpful than not using the C3 environment.</p>
author2 Dr. David Dampier
author_facet Dr. David Dampier
Haynes, Kaitlin Britt
author Haynes, Kaitlin Britt
author_sort Haynes, Kaitlin Britt
title A command and control approach to red teaming
title_short A command and control approach to red teaming
title_full A command and control approach to red teaming
title_fullStr A command and control approach to red teaming
title_full_unstemmed A command and control approach to red teaming
title_sort command and control approach to red teaming
publisher MSSTATE
publishDate 2014
url http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292014-215711/
work_keys_str_mv AT hayneskaitlinbritt acommandandcontrolapproachtoredteaming
AT hayneskaitlinbritt commandandcontrolapproachtoredteaming
_version_ 1716732263391035392