Staffordshire University logo
STORE - Staffordshire Online Repository

Security through Deception

VIDALIS, Stilianos and Kazmi, Zafar (2007) Security through Deception. Information Systems Security, 16 (1). pp. 34-41. ISSN 1065-898X

[img] Text
Security through deception.doc

Download (165kB)

Abstract or description

For each layer of information security there is a number of techniques and tools that can be used to ensure information superiority. Indeed some experts would argue that you can not have the former without the later. In today’s technological & interconnected world though, information superiority is very hard to achieve and almost impossible to maintain. This paper will argue that the art of deception is a reliable and cost effective technique that can assure the security of an infrastructure. The paper will conclude by presenting a technical solution of the above statement.

Item Type: Article
Uncontrolled Keywords: information security, information superiority, deception, virtual honeypots
Subjects: G400 Computer Science
G500 Information Systems
Faculty: Faculty of Computing, Engineering and Sciences > Computing
Depositing User: Stilianos VIDALIS
Date Deposited: 19 Apr 2013 11:47
Last Modified: 19 Apr 2013 11:47
URI: http://eprints.staffs.ac.uk/id/eprint/784

Actions (login required)

View Item View Item

DisabledGo Staffordshire University is a recognised   Investor in People. Sustain Staffs
Legal | Freedom of Information | Site Map | Job Vacancies
Staffordshire University, College Road, Stoke-on-Trent, Staffordshire ST4 2DE t: +44 (0)1782 294000