FAQs

Purple Teams

By |2019-06-14T12:16:01+00:00June 14th, 2019|

Some organisations use purple teams who carry out the work of both red and blue teams, hunting, detecting and fixing [...]

Blue Teams

By |2019-06-14T12:15:40+00:00June 14th, 2019|

Internal security teams who defend against real and simulated (i.e. red team) attacks. They have to be constantly vigilant against [...]

Red Teams

By |2019-06-14T12:15:21+00:00June 14th, 2019|

External ethical hackers (legitimate, licenced, deliberately-hired) brought in to test the effectiveness of a security programme by emulating a real [...]

Ethical hackers

By |2019-06-14T12:17:35+00:00June 14th, 2019|

Legal, legitimate, licenced hackers who are deliberately employed or hired by organisations to test their digital security defences. See Red [...]

Script kiddie

By |2019-06-14T12:14:31+00:00June 14th, 2019|

Also known as a skiddie or skid. An unskilled amateur hacker who uses existing exploit programs and files (scripts) to [...]

Botnet

By |2019-06-14T12:13:46+00:00June 14th, 2019|

The term botnet is derived from the words robot and network. A bot in this case is a device infected [...]

Spam

By |2019-06-14T12:13:08+00:00June 14th, 2019|

Irrelevant or unsolicited email messages, typically to a large number of users, for the purposes of advertising or, in the [...]