Red Team
A red team is a group of individuals authorized to emulate a cyberattack against a company’s security system. The red team takes on the role of “cybercriminals” and will do everything they can to breach a system. The purpose of the red team, and by extension, the emulated attack, is to discern and identify vulnerabilities in an entity’s security system and rectify them. Red teams can work for an organization, or they can also be hired outside the organization with the purpose of “attacking” a company’s security system.
Red team exercises can be conducted on-site, over a cloud security system, or on mobile devices. Techniques used include but are not limited to, social engineering, network penetration testing, and physical security assessments.