VIDALIS, Stilianos and Kazmi, Zafar (2007) Security through Deception. Information Systems Security, 16 (1). pp. 34-41. ISSN 1065-898X
Security through deception.doc
Download (165kB)
Abstract or description
For each layer of information security there is a number of techniques and tools that can be used to ensure information superiority. Indeed some experts would argue that you can not have the former without the later. In today’s technological & interconnected world though, information superiority is very hard to achieve and almost impossible to maintain. This paper will argue that the art of deception is a reliable and cost effective technique that can assure the security of an infrastructure. The paper will conclude by presenting a technical solution of the above statement.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | information security, information superiority, deception, virtual honeypots |
Faculty: | Previous Faculty of Computing, Engineering and Sciences > Computing |
Depositing User: | Stilianos VIDALIS |
Date Deposited: | 19 Apr 2013 11:47 |
Last Modified: | 24 Feb 2023 13:37 |
URI: | https://eprints.staffs.ac.uk/id/eprint/784 |