Week 2 - Assignment Example

Comments (0) Cite this document
These two color-coded teams derive their names from military antecedents in which the red team is designated as the “attacking team” while the blue team is given the task of defending against a simulated enemy attack. In the context of organizational network security/…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Week 2 Assignment
Read TextPreview

Extract of sample "Week 2"

RED AND BLUE TEAMS IN NETWORK SECURITY (Week 2 assignment) ID Number: of of University (affiliation)
Location of University:
Word Count: 343 (text only)
Date of Submission: August 14, 2014
These two color-coded teams derive their names from military antecedents in which the red team is designated as the “attacking team” while the blue team is given the task of defending against a simulated enemy attack. In the context of organizational network security/ information systems, these two teams play a vital part in ensuring that an organizations data remains secure. In essence, this red team – blue team adversarial simulated attacks helps to pinpoint weaknesses in an organizations existing electronic infrastructure by subjecting it to a “war game” situation in which the enemy (Red Team) attempts to hack and infiltrate its information system either to get some valuable data or destroy its enemys data to render it useless and make the enemy incapable of any coherent response. It is an exercise in assessing a capability to respond to an attack.
The Red Team attacks a designated enemys information security systems to test its own capability of carrying out an attack and also to test the ability of the Blue Team to defend against such an attack (Mejia, 2008, para. 2). While merely simulated, there is great value in an exercise like this because it allows both teams and the top management people to think of entire network security and see it in a wholistic manner rather than be bogged down in parochial interests. The Red Team thinks like an outsider and looks for any vulnerabilities they can exploit in the existing information security system infrastructure of their designated target. The Blue Team defending is also benefited because it learns of security holes in the system and becomes alert and vigilant. In a larger sense, the Red Team is more valuable because it can give top management people warning to not be complacent or take things for granted and so any flaws discovered in this exercise must be fixed immediately. This is similar to the white hat versus black hat exercises in which black hats are the hackers and white hats are the defenders (Bokotey et al., 2003, p. 432).
Bokotey, D.. Mason, A. G., & Morrow, R. (2003). CCIE Practical studies: Security. Indianapolis, IN, USA: Pearson Learning.
Mejia, R. (2008, April 27). “Red team, blue team: How to run an effective simulation.” Network World. Retrieved August 14, 2014 from
Due: August 17, 2014 @ 12:48 p.m. Read More
Cite this document
  • APA
  • MLA
(“Week 2 Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Week 2 Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from
(Week 2 Assignment Example | Topics and Well Written Essays - 250 Words)
Week 2 Assignment Example | Topics and Well Written Essays - 250 Words.
“Week 2 Assignment Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Week 2

...College: Assignment Question Grid computing plays a critical role in the technological environment, since it facilitates various beneficial activities for an organization. Virgin mobile needs to implement grid computing, for it improves and enhances the collaboration of virtual organizations. In addition, it enhances data sharing and access in the organization; thus, it promotes organizational cohesion. Grid computing will enable the Virgin mobile company to exercise flexibility, because the organization can function effectively without the establishment of offices in each region of operation. (Lightstone, Teorey, and Ladeau 120). Question 2 Enterprise architecture depicts the manner in which an organization will...
1 Pages(250 words)Assignment

Week 2 workshop

...Answer A. Frequency Table The frequency table is a method of counting the number of occurrences of a particular value in a given data set. The table below shows the frequency table for the income of the corporate customers: Salary Count 100000 1 200000 2 300000 3 400000 2 500000 1 B. Measure of Central Tendency It is evident from the frequency table that the salary of corporate customers follows a normal curve. The same is shown with the help of a histogram: For a normal curve, the best measure of central tendency is the mean. The mean is computed by summing the observations and dividing by the number of observations (Keller, 2012). There are no outliers here and the frequency graph is not skewed....
2 Pages(500 words)Assignment

Week 2 discussion 2

...NASDAQ STOCK MARKET   NADAQ stock market NASDAQ COMPOSITE INDEX YEARLY RETURNS YEAR BEGINNING PRICE ENDING PRICE GAIN OR LOSS PERCENTAGE GAIN OR LOSS 2004 2003.37 2175.44 172.07 8.59% 2005 2175.44 2205.32 29.88 1.37% 2006 2205.32 2415.29 209.97 9.52% 2007 2415.29 2652.28 236.99 9.81% 2008 2652.28 1577.03 -1075.25 -40.54% 2009 1577.03 2269.15 692.12 43.89% 2010 2269.15 2652.87 383.72 16.91% 2011 2652.87 2605.15 -47.72 -1.80% 2012 2605.15 3019.51 414.36 15.91% 2013 3019.51 4176.59 1157.08 38.32% Introduction The NASDAQ stock market is an American securities exchange that is the second largest securities exchange worldwide by market value capitalization after the New York Securities exchange. Started in 1971, the stock market has... STOCK MARKET ...
6 Pages(1500 words)Assignment

Week 2

...Computer Sciences and Information Technology al Affiliation It is a fundamental requirement that everyone gets to understand the risks associated with information flaws, so as to make informed decisions on how to secure information. With the advancement of technology, there has been encroachment into private information through various forms of cybercrime. Several organisations have fought to get to mitigate this vice through various measures. Many systems have been developed but still the ordeal is critical. In this essay, there is a sample case study of a company security system, furthermore there are two articles namely “A Stuxnet Future? Yes, Offensive Cyber-Warfare is Already Here and Thinking Again: Cyber War... Sciences and Information ...
2 Pages(500 words)Assignment

Week 2 Discussion

...Discussion Cyber competitions are an important way to determine the skills and talent of different cyber teams and individuals. These competitions are held to know the competencies and innovative ideas of cyber professionals. Cyber competitions also reflect the interest of students in the development of cyber security mechanisms (Bardas & Ou, 2013). There are different methods and tools to score cyber competitions. My model for scoring cyber competitions would involve awarding points for display of skills and abilities related to projects, completing the tasks within time, completing the tasks with the most suitable and innovative skills, and implementing and maintaining a proper collaborative working mechanism throughout... Cyber...
1 Pages(250 words)Assignment


...Total Cost Ownership Procurement managers in organizations view TCO as the costs related to a product throughout its lifetime. The life time of a product has several phases; development, design, usage, maintenance, and finally disposal of the product. Sustainability also considers the effect of the environment during the entire lifecycle (Richard, 2004). TCO considers the long term cost value of products to organizations, through evaluation of direct costs and indirect costs during purchase. In management accounting, TCO is applicable in cost accounting, ecological economics. TCO is much wider in manufacturing; the cost involve include cycle time, repair, ship, re-ship, opportunity, incentives, tax credit, delivery and supplier... Cost...
1 Pages(250 words)Assignment

Discussion board week 2

...Organizational Management Challenges al Affiliation) The challenges facing the management of organizations today include, marketing communications, like technology advancements that are improving at an alarming rate. It is expensive to manage and install a new system. This is because it requires experts to install the system in the organization. In addition, it requires training employees on the new system that is cumbersome and some employees might be hesitant to adopt the system. It is important for the organization to have a long-term strategy in regards to technology. The management may hire technologists who keep abreast with the emerging technology trends to remain flexible and to take advantage of unforeseen developments... Management...
1 Pages(250 words)Assignment


...of the needs in the hierarchy, whereas Maslow’s theory considers a systematic satisfaction of the needs starting from the bottom to the top. The third difference also relates to the movement within the hierarchy (Loh, Dawn, & Schapper, p. 14). The ERG theory states that a person can move backwards in the satisfaction of their needs, while Maslow’s theory states that once a need is satisfied the situation becomes permanent. I have applied the ERG theory in various ways. For instance, there was a time when I became sick and had an admission at the hospital. The treatment took a whole week and I could not manage to pay the bill because the money I had was meant for the college semester that followed. However, I had to...
1 Pages(250 words)Assignment

Week 2 discussion

...Week 2 Discussion Week 2 Discussion Behaviourism is a theory of learning that concentrates on observable behaviour rather than internal thinking. The theory of behaviourism operates on the principle of stimulus-response due to the belief that behaviour is caused by external stimuli. Ivan Pavlov demonstrated intellectual brilliance through his concept of classical conditioning. Pavlov offers the most compelling argument for the use of behaviourism when teaching a new subject to an adult or a child. Ivan Pavlov could use systematic desensitization to teach an adult a new skill of avoiding hydrophobia. The behaviourist would train the patient to relax while exposing him or...
1 Pages(250 words)Assignment

Week 2 individual assignment

... of Phoenix Material Scientific Method Matrix Research is a primary component of sociology. Valid and relevant sociological research is dependent upon a commitment to applying the scientific method in a systematic and organized way in order to ensure maximum objectivity and consistency in research. Complete the following matrix based on a social problem of your choice. The matrix will serve as a guide for creating a preliminary plan for the basic steps of the scientific method. Scientific Method Matrix Social problem Identify a social problem of your choice. A problem statement is often written as a research question. Limit the problem statement to one sentence. Example: Is going to college worth the time and money? Can sexual...
3 Pages(750 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Week 2 Assignment for FREE!

Contact Us