Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Journal of Homeland Security and Emergency Management

Editor-in-Chief: Renda-Tanali, Irmak

Managing Editor: McGee, Sibel

4 Issues per year

IMPACT FACTOR 2017: 0.712

CiteScore 2017: 0.92

SCImago Journal Rank (SJR) 2017: 0.242
Source Normalized Impact per Paper (SNIP) 2017: 0.615

See all formats and pricing
More options …

Live Fire Exercise: Preparing for Cyber War

Kenneth Geers
Published Online: 2010-12-26 | DOI: https://doi.org/10.2202/1547-7355.1780

In May 2010, the Cooperative Cyber Defence Centre of Excellence and the Swedish National Defence College hosted the Baltic Cyber Shield (BCS) international cyber defense exercise (CDX). For two days, six Blue Teams from northern European government, military and academic institutions defended simulated power generation companies against a Red Team of 20 hostile computer hackers. The scenario described a volatile geopolitical environment in which a hired-gun Rapid Response Team of network security personnel defended Critical Information Infrastructure (CII) from cyber attacks sponsored by a non-state terrorist group. This article covers the origin and evolution of CDXs, and it describes the design, goals and lessons learned from BCS 2010.

Keywords: cyber defense exercise; CDX; cyber attack; Baltic Cyber Shield; Blue Team; Red Team; hacker; Estonia; Sweden

About the article

Published Online: 2010-12-26

Citation Information: Journal of Homeland Security and Emergency Management, Volume 7, Issue 1, ISSN (Online) 1547-7355, DOI: https://doi.org/10.2202/1547-7355.1780.

Export Citation

©2011 Walter de Gruyter GmbH & Co. KG, Berlin/Boston.Get Permission

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

Hannes Holm, Mathias Ekstedt, and Dennis Andersson
IEEE Transactions on Dependable and Secure Computing, 2012, Volume 9, Number 6, Page 825
Christian Czosseck, Rain Ottis, and Anna-Maria Talihärm
International Journal of Cyber Warfare and Terrorism, 2011, Volume 1, Number 1, Page 24

Comments (0)

Please log in or register to comment.
Log in