© Jacob G. Oakley 2019
Jacob G. OakleyProfessional Red Teaminghttps://doi.org/10.1007/978-1-4842-4309-1_13

13. Evaluating Offensive Security Processes

Jacob G. Oakley1 
(1)
Owens Cross Roads, AL, USA
 

This and the following chapters show the challenge and value in evaluating offensive security technologies in a defensible and meaningful way. The following example focuses on experimental evaluation of the CAPTR team concept that was used in the academic arena. However, the framework created to perform this experimental evaluation can be used in both academia and industry, providing a repeatable and structured process to compare one offensive security method to another.

Unlike other security technologies, offensive security assessment does not easily ...

Get Professional Red Teaming: Conducting Successful Cybersecurity Engagements now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.