Statements (50)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cybersecurity_term
|
| gptkbp:canBe |
external consultants
internal team |
| gptkbp:contrastsWith |
gptkb:Blue_Team
gptkb:Purple_Team gptkb:White_Team |
| gptkbp:documentedIn |
gptkb:MITRE_ATT&CK_framework
gptkb:NIST_SP_800-115 cybersecurity best practices |
| gptkbp:focusesOn |
offensive security
|
| gptkbp:goal |
identify security weaknesses
improve organizational security |
| gptkbp:involves |
risk assessment
security testing adversary emulation attack simulation threat emulation |
| gptkbp:membersInclude |
security professionals
ethical hackers |
| gptkbp:opposedBy |
gptkb:Blue_Team
|
| gptkbp:originatedIn |
military terminology
|
| gptkbp:performs |
phishing attacks
social engineering vulnerability assessment network exploitation physical security testing |
| gptkbp:provides |
security recommendations
|
| gptkbp:purpose |
test security defenses
|
| gptkbp:relatedTo |
gptkb:Blue_Team
gptkb:Purple_Team penetration testing |
| gptkbp:reportsTo |
organization management
|
| gptkbp:requires |
gptkb:government_agency
rules of engagement |
| gptkbp:result |
gptkb:security_report
remediation plan |
| gptkbp:role |
simulate adversary attacks
|
| gptkbp:sometimesCalled |
attack team
ethical hacking team offensive security team |
| gptkbp:usedBy |
gptkb:government_agency
private companies financial institutions military organizations critical infrastructure operators |
| gptkbp:usedIn |
military exercises
cybersecurity exercises |
| gptkbp:bfsParent |
gptkb:DARPA_Grand_Challenge
|
| gptkbp:bfsLayer |
5
|
| https://www.w3.org/2000/01/rdf-schema#label |
Red Team
|