Deception Strategies: Networks, Organization, and Structures

2014 
Deception is a useful strategy for the defenders of network security since it offers opportunities to distract the adversary away from protected information, misinform the adversary as to the success of the attack, and disrupt the utility of the attack by corrupting the information resulting from it. One subset of deception methods is those that use the infrastructure of the network itself in a manner that may deceive adversaries. Redundant servers; external hosting of computers, services, and applications; and shifting network addresses provide an opportunity to distract, misinform, delay, and perhaps discourage adversaries from trying to compromise an organization’s information assets.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []