top of page

Why don't we start off by playing a little game?

We have two players, with one aiming to take advantage of the other.

This is Red...

Screenshot 2024-05-03 at 11.45.49 PM.png

Our mischief with bad intentions, eyeing trouble at first sight

This is Blue...

Screenshot 2024-05-03 at 11.46.15 PM.png

Our patroller with one intention, and one intention only...

​

Stop Red from causing harm, WHATEVER IT TAKES

Red and Blue spend most of their time on networks: nodes which are connected by edges. Why don't we take some time to learn what all the buzz is about?

How do we play?
Let's Add a Twist!
The Island of Denial of Service
The Island of Adversary Emulation
The keys to a Robust, Security System
Signing Off
  1. Right strategies + support -> A stronger foundation and stronger team Blue.

​

​

Just as going to the gym regularly slowly builds your strength, there's no overnight solution for building the best network defense. A great network defense is one that's adaptable to the network, the attack situation, or the different parameter combinations.

​

  1. The more privileges -> increased complexity.

​

With the addition of the proportion parameter, we saw that it allowed for the Reds to capture a building more than once. It lead to needing more blues to safeguard the network. However, there are endless possibilities to change the game: What if you could change the network space? Or Expand it? Such changes, such as the network space, allow for unique ways to play while keeping its core intact.

​

​

  1. Red + Blue -> An unstoppable duo.

​

As Red and Blue play against each other, you are learning more about a network's strengths and weaknesses. They inform you on how to defend the network as efficiently as possible.

Thank you for coming along for the ride.
This interactive lesson is based off the mathematical game known as Revolutionaries and Spies. It was first introduced by Jozef Beck in the 1990s, with the first lecture by Douglas West in 2012. 
In the three-decades, there's been a plethora of research, but very little has been devoted to the real-world connections, in particular towards security.
Security gets very complex very quickly, as attackers have found new ways to exploit holes, while defenders have had to devise solutions for these issues. It becomes a vicious cycle, with a variety of resources making security hard to digest for the average reader.
This lesson is the first step to not only expand the research study, but to address and break down the connection in an intuitive way. While opposites, we've shown that Red and Blue are the perfect complementary match to withstand any attack, on any network. In short, they are a dynamic duo.
Thanks and other further credits here.
Miscellaneous, Future Ideas:
Screenshot 2024-10-03 at 12.32.25 AM.png
Screenshot 2024-10-03 at 2.40_edited.png
Screenshot 2024-10-03 at 12.36.25 AM.png
Screenshot 2024-10-03 at 2.40_edited.png
Screenshot 2024-10-03 at 2.40_edited.png
bottom of page