Red team blue team work on two approaches, one attacks it while blue team defends it. View this presentation now to understand what is red team and blue team and its importance in ethical hacking!
Happy learning!!
2. What is a Red tEAM
✗ A red team consists of security professionals who act
as adversaries to overcome cyber security controls.
✗ Red teams often consist of independent ethical
hackers who evaluate system security in an objective
manner.
✗
2
5. What is a Blue tEAM
✗ A blue team consists of security professionals who
have an inside out view of the organization.
✗ Their task is to protect the organization’s critical
assets against any kind of threat.
5
6. How does a Blue team works
6
Gathers
information
Monitor
tools
Regular
checks
Risk
assessments
7. Examples
✗ Performing DNS audits
✗ Performing Digital footprint analysis
✗ Ensuring firewall access control
✗ SIEM Solutions
7
8. Benefits of Red team Blue team
✗ Implementing Red and blue team allows an organization to benefit from
two very different approaches.
✗ Red team is valuable that it identifies vulnerabilities but also highlight
current status of the system
✗ The blue team is valuable in that it gives long term protection by ensuring
defenses remain strong, and by constant monitoring of the system.
8
9. Red Team vs Blue Team
✗ Black box testing
✗ Ethical hacking
✗ Exploiting vulnerabilities
✗ Offensive security
✗ Penetration testing
✗ Social engineering
✗ Damage control
✗ Defensive security
✗ Digital forensics
✗ Incident response
✗ Infrastructure protection
✗ Threat hunters
9