Explore open access research and scholarly works from STORE - University of Staffordshire Online Repository

Advanced Search

Security through Deception

VIDALIS, Stilianos and Kazmi, Zafar (2007) Security through Deception. Information Systems Security, 16 (1). pp. 34-41. ISSN 1065-898X

[thumbnail of Security through deception.doc] Text
Security through deception.doc

Download (165kB)

Abstract or description

For each layer of information security there is a number of techniques and tools that can be used to ensure information superiority. Indeed some experts would argue that you can not have the former without the later. In today’s technological & interconnected world though, information superiority is very hard to achieve and almost impossible to maintain. This paper will argue that the art of deception is a reliable and cost effective technique that can assure the security of an infrastructure. The paper will conclude by presenting a technical solution of the above statement.

Item Type: Article
Uncontrolled Keywords: information security, information superiority, deception, virtual honeypots
Faculty: Previous Faculty of Computing, Engineering and Sciences > Computing
Depositing User: Stilianos VIDALIS
Date Deposited: 19 Apr 2013 11:47
Last Modified: 24 Feb 2023 13:37
URI: https://eprints.staffs.ac.uk/id/eprint/784

Actions (login required)

View Item
View Item