Secondary Title
TalTech
Abstract
In term of operation based cyber-security exercise these teams include in general:
1. White team: A team that creates or generates a cyber-security exercise environment.
2. Red team: A team that attacks the cyber-security exercise environment.
3. Blue team: A team that defends the cyber-security exercise environment
Concluding remarks
This study focuses measurement on the user’s perceived usability, and learnability using the System Usability Scale (SUS) approach. Efficiency is measured by the speed in
which tasks were completed both manually and using the prototype. Tasks were designed as a classic test-and-measure approach to elicit a semblance of interaction between the forensic examiner and the prototype in solving an investigation.
which tasks were completed both manually and using the prototype. Tasks were designed as a classic test-and-measure approach to elicit a semblance of interaction between the forensic examiner and the prototype in solving an investigation.
Reference details
DOI
10.14722/ndss.2018.23107)
Resource type
Miscellaneous
Year of Publication
2019
Publication Area
Cybersecurity and defense
How to cite this reference:
Modeling Attack and Defense Scenarios for Cyber Security Exercises. (2019). https://doi.org/10.14722/ndss.2018.23107)