Cyber security deception

59Citations
Citations of this article
98Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Our physical and digital worlds are converging at a rapid pace, putting a lot of our valuable information in digital formats. Currently, most computer systems' predictable responses provide attackers with valuable information on how to infiltrate them. In this chapter, we discuss how the use of deception can play a prominent role in enhancing the security of current computer systems. We show how deceptive techniques have been used in many successful computer breaches. Phishing, social engineering, and drive-by-downloads are some prime examples. We discuss why deception has only been used haphazardly in computer security. Additionally, we discuss some of the unique advantages deception-based security mechanisms bring to computer security. Finally, we present a framework where deception can be planned and integrated into computer defenses.

Cite

CITATION STYLE

APA

Almeshekah, M. H., & Spafford, E. H. (2016). Cyber security deception. In Cyber Deception: Building the Scientific Foundation (pp. 23–50). Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free