Red Team in a Box (RTIB): Developing Automated Tools to Identify, Assess, and Expose Cybersecurity Vulnerabilities in Department of the Navy Systems - Cyberspace Operations and Cyber Kill Chain Red Team in a Box (RTIB): Developing Automated Tools to Identify, Assess, and Expose Cybersecurity Vulnerabilities in Department of the Navy Systems - Cyberspace Operations and Cyber Kill Chain

Red Team in a Box (RTIB): Developing Automated Tools to Identify, Assess, and Expose Cybersecurity Vulnerabilities in Department of the Navy Systems - Cyberspace Operations and Cyber Kill Chain

    • £5.99
    • £5.99

Publisher Description

This report has been professionally converted for accurate flowing-text e-book format reproduction. The U.S. Navy and Marine Corps manage a vast number of computer systems, both afloat and ashore, many of which are neither directly connected to an external Internet Protocol (IP) network nor updated regularly, but do occasionally interact with other IP-connected devices. As malicious actors advance their capabilities to exploit and penetrate computer networks, the Department of the Navy (DoN) must be able to verify whether or not its computer systems are susceptible to cyber-attacks. A current mitigation technique is to use a cyber red team to assess a friendly network in a controlled environment; however, this method of conducting assessments can be costly and time-consuming, and may not target specific critical systems. This thesis developed a proof-of-concept tool called Red Team in a Box (RTIB) that addresses the current resource limitations of cyber red teams by leveraging open source software and other methods to discover, identify, and conduct a vulnerability scan on a computer system's software via a graphical user interface. The results of the vulnerability scan offer the RTIB user possible mitigation strategies to lower the risk from potential cyber-attacks without the need for a dedicated cyber red team operating on the target host or network. This research fundamentally provides the foundation to further develop an automated tool that Sailors and Marines with limited expertise can use to conduct a thorough cybersecurity vulnerability assessment on DoN systems.

This compilation includes a reproduction of the 2019 Worldwide Threat Assessment of the U.S. Intelligence Community.

Sailors and Marines located in environments with limited Internet connectivity, such as onboard ships or at forward operating bases, have limited capabilities to scan their computer systems and other embedded devices for vulnerabilities. The benefit of this research is to provide a portable, intuitive, and practical framework for Sailors and Marines with little cyber expertise to assess their internal systems against an array of known cyber vulnerabilities. Two research scenarios tested a simulated Navy and Marine Corps system with the intent of identifying security vulnerabilities and providing the user with possible recommendations for mitigating the cyber-related threats.

GENRE
History
RELEASED
2019
1 September
LANGUAGE
EN
English
LENGTH
123
Pages
PUBLISHER
Progressive Management
SIZE
1.9
MB

More Books Like This

Bifrost: A Statistical Analysis Framework for Detecting Insider Threat Activities on Cyber Systems - Monitoring Network Resources Against Hosts Who Exhibit Threat Characteristics of Insider Activity Bifrost: A Statistical Analysis Framework for Detecting Insider Threat Activities on Cyber Systems - Monitoring Network Resources Against Hosts Who Exhibit Threat Characteristics of Insider Activity
2019
Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching
2018
Federal Cybersecurity Research and Development Strategic Plan: Artificial Intelligence, Quantum Information Science, Privacy, Secure Hardware and Software, Education and Workforce Development Federal Cybersecurity Research and Development Strategic Plan: Artificial Intelligence, Quantum Information Science, Privacy, Secure Hardware and Software, Education and Workforce Development
2019
The Basics of Cyber Warfare The Basics of Cyber Warfare
2012
Cyber Warfare Cyber Warfare
2013
Cyber Warfare – Truth, Tactics, and Strategies Cyber Warfare – Truth, Tactics, and Strategies
2020

More Books by Progressive Management

Wings in Orbit: Scientific and Engineering Legacies of the Space Shuttle, 1971-2010 Wings in Orbit: Scientific and Engineering Legacies of the Space Shuttle, 1971-2010
2011
2011 Complete Guide to IEDs: Improvised Explosive Devices: Enemy Tactics, Roadside Bombs, Counter-IED Targeting, Defeat the Device, Programs, Technologies, Afghanistan, Iraq, JIEDDO 2011 Complete Guide to IEDs: Improvised Explosive Devices: Enemy Tactics, Roadside Bombs, Counter-IED Targeting, Defeat the Device, Programs, Technologies, Afghanistan, Iraq, JIEDDO
2010
Nigeria: Federal Research Study and Country Profile with Comprehensive Information, History, and Analysis - Politics, Economy, Military Nigeria: Federal Research Study and Country Profile with Comprehensive Information, History, and Analysis - Politics, Economy, Military
2011
21st Century Guide to Solar Power and Photovoltaics: Green Domestic Power from the Sun - Practical Information about Home Electricity, Water Heating, Panel and Cells, Solar Energy Financing 21st Century Guide to Solar Power and Photovoltaics: Green Domestic Power from the Sun - Practical Information about Home Electricity, Water Heating, Panel and Cells, Solar Energy Financing
2010
The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108) The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108)
2012
21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series) 21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series)
2011