Cyber Denial, Deception and Counter Deception Cyber Denial, Deception and Counter Deception
Advances in Information Security

Cyber Denial, Deception and Counter Deception

A Framework for Supporting Active Cyber Defense

Kristin E. Heckman 및 다른 저자
    • US$129.99
    • US$129.99

출판사 설명

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme.

The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role insecuring private information. Detailed case studies are included.

Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book. 

장르
컴퓨터 및 인터넷
출시일
2015년
11월 13일
언어
EN
영어
길이
266
페이지
출판사
Springer International Publishing
판매자
Springer Nature B.V.
크기
3
MB
Cyber Crime and Espionage Cyber Crime and Espionage
2011년
Introduction to Cyberdeception Introduction to Cyberdeception
2016년
Reverse Deception: Organized Cyber Threat Counter-Exploitation Reverse Deception: Organized Cyber Threat Counter-Exploitation
2012년
Navigating New Cyber Risks Navigating New Cyber Risks
2019년
Information Warfare Information Warfare
2012년
Ninja Hacking Ninja Hacking
2010년
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009년
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016년
Security for Telecommunications Networks Security for Telecommunications Networks
2008년
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007년
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015년
Network Security Policies and Procedures Network Security Policies and Procedures
2007년