Abstract

Deception has been widely deployed in human conflicts, but its application to information security could only be witnessed since the early 1990s. Different deception techniques have been proposed as part of computer-based information operations (IO), in order to facilitate specific warfare campaigns. In the recent years, a number of researchers have investigated different deception techniques used in computer-based networks, such as honeypots and honeynets, but in the light of several emerging issues more consideration is required in exploring deception as a strategic capability for Computer Network Defence (CND). In this discussion paper we address the potentially important role that deception can play for CND, similarly to its important role within conventional warfare and IO. We also highlight issues of further research towards the integration of deception in information security practices.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.