Statements (50)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cybersecurity term
|
gptkbp:canBe |
external consultants
internal team |
gptkbp:contrastsWith |
gptkb:Blue_Team
gptkb:Purple_Team gptkb:White_Team |
gptkbp:documentedIn |
gptkb:MITRE_ATT&CK_framework
gptkb:NIST_SP_800-115 cybersecurity best practices |
gptkbp:focusesOn |
offensive security
|
gptkbp:goal |
identify security weaknesses
improve organizational security |
https://www.w3.org/2000/01/rdf-schema#label |
Red Team
|
gptkbp:involves |
risk assessment
security testing adversary emulation attack simulation threat emulation |
gptkbp:membersInclude |
security professionals
ethical hackers |
gptkbp:opposedBy |
gptkb:Blue_Team
|
gptkbp:originatedIn |
military terminology
|
gptkbp:performs |
phishing attacks
social engineering vulnerability assessment network exploitation physical security testing |
gptkbp:provides |
security recommendations
|
gptkbp:purpose |
test security defenses
|
gptkbp:relatedTo |
gptkb:Blue_Team
gptkb:Purple_Team penetration testing |
gptkbp:reportsTo |
organization management
|
gptkbp:requires |
gptkb:government_agency
rules of engagement |
gptkbp:result |
remediation plan
security report |
gptkbp:role |
simulate adversary attacks
|
gptkbp:sometimesCalled |
attack team
ethical hacking team offensive security team |
gptkbp:usedBy |
gptkb:government_agency
private companies financial institutions military organizations critical infrastructure operators |
gptkbp:usedIn |
military exercises
cybersecurity exercises |
gptkbp:bfsParent |
gptkb:DARPA_Grand_Challenge
|
gptkbp:bfsLayer |
5
|