1 00:00:00,060 --> 00:00:01,860 Let's talk about these red blue chips. 2 00:00:03,230 --> 00:00:09,380 So team people mainly focuses on offense and try to hack into as many systems as well with the permission 3 00:00:09,380 --> 00:00:10,040 of our allies. 4 00:00:10,520 --> 00:00:16,520 So these are like black attackers, but they have the permission of an organization and they do the 5 00:00:16,520 --> 00:00:20,410 offensive conditioning and try to exploit as many systems as possible. 6 00:00:22,320 --> 00:00:28,920 These are the difference between these and these, letting people have the permission of the U.S. and 7 00:00:28,920 --> 00:00:35,190 they can go back to the situation where there is no conditioning performed. 8 00:00:35,880 --> 00:00:40,950 So welcoming to the blue, the blue team focuses on improving security by patching vulnerabilities, 9 00:00:40,950 --> 00:00:46,130 upgrading software and make sure that security mechanisms are implemented and functioning correctly. 10 00:00:46,440 --> 00:00:51,420 It means that putting people work on their defense, that they passed our abilities to make sure that 11 00:00:51,850 --> 00:00:57,540 are the software are up and they will implement some security mechanisms like firewalls, intrusion 12 00:00:57,540 --> 00:00:59,160 detection systems and etc.. 13 00:00:59,790 --> 00:01:04,830 So after these both teams help perform with the. 14 00:01:06,180 --> 00:01:14,760 Work, it takes generally more than normal, this routine and routine operations normally takes more 15 00:01:14,760 --> 00:01:16,200 than a fantastic time. 16 00:01:16,470 --> 00:01:18,360 It takes only four or five weeks. 17 00:01:18,510 --> 00:01:24,960 And after those final four or five weeks, these are 18 people and routine people gather together and 18 00:01:24,960 --> 00:01:31,680 they will show each other what techniques need to be implemented to improve the security of an organization. 19 00:01:32,310 --> 00:01:37,770 These are team people at the root routine, people on how to patch this vulnerability and how to. 20 00:01:38,800 --> 00:01:39,420 Identify. 21 00:01:39,850 --> 00:01:44,450 I mean, how does a kid from this island run or will they have identify? 22 00:01:46,160 --> 00:01:53,210 So in that way, the red team and rooting people together improve the security of an organization.