Loading…

Security Through Deception

For each layer of information security there is a number of techniques and tools that can be used to ensure information superiority. Indeed some experts would argue that you cannot have the former without the latter. In today's technological & interconnected world, however, information supe...

Full description

Saved in:
Bibliographic Details
Published in:Information systems security 2007, Vol.16 (1), p.34-41
Main Authors: Vidalis, Stilianos, Kazmi, Zafar
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:For each layer of information security there is a number of techniques and tools that can be used to ensure information superiority. Indeed some experts would argue that you cannot have the former without the latter. In today's technological & interconnected world, however, information superiority is very hard to achieve and almost impossible to maintain. This paper will argue that the art of deception is a reliable and cost effective technique that can assure the security of an infrastructure. The paper will conclude by presenting a technical solution of the above statement.
ISSN:1065-898X
1939-3555
1934-869X
1939-3547
DOI:10.1080/10658980601051458