Glossary

Definitions for those new to cyber security

GLOSSARY
In the context of cybersecurity testing, red teams play the role of attackers, and blue teams act as defenders. A purple team falls somewhere in between, often performing both roles. Purple teams can also be inserted into red/blue testing engagements to help evaluate the testing protocol and ensure that red and blue teams communicate and collaborate effectively.
During cyber security testing engagements, blue teams evaluate organizational security environments and defend these environments from red teams. These red teams play the role of attackers by identifying security vulnerabilities and launching attacks within a controlled environment. Both teams combine to help illuminate the true state of an organization’s security.
Red teams are “ethical hackers” who help test an organization’s defenses by identifying vulnerabilities and launching attacks in a controlled environment. Red teams are opposed by defenders called blue teams, and both parties work together to provide a comprehensive picture of organizational security readiness.
Red teams are “ethical hackers” who help test an organization’s defenses by identifying vulnerabilities and launching attacks in a controlled environment. Red teams are opposed by defenders called blue teams, and both parties work together to provide a comprehensive picture of organizational security readiness.