File:RED TEAM IN A BOX (RTIB)- DEVELOPING AUTOMATED TOOLS TO IDENTIFY, ASSESS, AND EXPOSE CYBERSECURITY VULNERABILITIES IN DEPARTMENT OF THE NAVY SYSTEMS (IA redteaminaboxrti1094562832).pdf
Original file (1,275 × 1,650 pixels, file size: 2.14 MB, MIME type: application/pdf, 90 pages)
Captions
Summary
[edit]RED TEAM IN A BOX (RTIB): DEVELOPING AUTOMATED TOOLS TO IDENTIFY, ASSESS, AND EXPOSE CYBERSECURITY VULNERABILITIES IN DEPARTMENT OF THE NAVY SYSTEMS ( ) | ||
---|---|---|
Author |
Plot, Joseph A. |
|
Title |
RED TEAM IN A BOX (RTIB): DEVELOPING AUTOMATED TOOLS TO IDENTIFY, ASSESS, AND EXPOSE CYBERSECURITY VULNERABILITIES IN DEPARTMENT OF THE NAVY SYSTEMS |
|
Publisher |
Monterey, CA; Naval Postgraduate School |
|
Description |
The U.S. Navy and Marine Corps manage a vast number of computer systems, both afloat and ashore, many of which are neither directly connected to an external Internet Protocol (IP) network nor updated regularly, but do occasionally interact with other IP-connected devices. As malicious actors advance their capabilities to exploit and penetrate computer networks, the Department of the Navy (DoN) must be able to verify whether or not its computer systems are susceptible to cyber-attacks. A current mitigation technique is to use a cyber red team to assess a friendly network in a controlled environment; however, this method of conducting assessments can be costly and time-consuming, and may not target specific critical systems. This thesis developed a proof-of-concept tool called Red Team in a Box (RTIB) that addresses the current resource limitations of cyber red teams by leveraging open source software and other methods to discover, identify, and conduct a vulnerability scan on a computer system’s software via a graphical user interface. The results of the vulnerability scan offer the RTIB user possible mitigation strategies to lower the risk from potential cyber-attacks without the need for a dedicated cyber red team operating on the target host or network. This research fundamentally provides the foundation to further develop an automated tool that Sailors and Marines with limited expertise can use to conduct a thorough cybersecurity vulnerability assessment on DoN systems. Subjects: red team; cyber; offensive cyber operations; vulnerability assessment; automation |
|
Language | English | |
Publication date | June 2019 | |
Current location |
IA Collections: navalpostgraduateschoollibrary; fedlink |
|
Accession number |
redteaminaboxrti1094562832 |
|
Source | ||
Permission (Reusing this file) |
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. |
Licensing
[edit]Public domainPublic domainfalsefalse |
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code.
Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.
|
||
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights. |
https://creativecommons.org/publicdomain/mark/1.0/PDMCreative Commons Public Domain Mark 1.0falsefalse
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 06:35, 24 July 2020 | 1,275 × 1,650, 90 pages (2.14 MB) | Fæ (talk | contribs) | FEDLINK - United States Federal Collection redteaminaboxrti1094562832 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #26245) |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Short title | RED TEAM IN A BOX (RTIB): DEVELOPING AUTOMATED TOOLS TO IDENTIFY, ASSESS, AND EXPOSE CYBERSECURITY VULNERABILITIES IN DEPARTMENT OF THE NAVY SYSTEMS |
---|---|
Image title | |
Author | Plot, Joseph A. |
Software used | Plot, Joseph A. |
Conversion program | Adobe PDF Library 11.0 |
Encrypted | no |
Page size |
|
Version of PDF format | 1.4 |