Abstract
Deception has been widely deployed in human conflicts, but its application to information security could only be witnessed since the early 1990s. Different deception techniques have been proposed as part of computer-based information operations (IO), in order to facilitate specific warfare campaigns. In the recent years, a number of researchers have investigated different deception techniques used in computer-based networks, such as honeypots and honeynets, but in the light of several emerging issues more consideration is required in exploring deception as a strategic capability for Computer Network Defence (CND). In this discussion paper we address the potentially important role that deception can play for CND, similarly to its important role within conventional warfare and IO. We also highlight issues of further research towards the integration of deception in information security practices.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.