Introduction to cyberdeception[elect...
Rowe, Neil C.

 

  • Introduction to cyberdeception[electronic resource] /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    杜威分類號: 005.8
    書名/作者: Introduction to cyberdeception/ by Neil C. Rowe, Julian Rrushi.
    作者: Rowe, Neil C.
    其他作者: Rrushi, Julian.
    出版者: Cham : : Springer International Publishing :, 2016.
    面頁冊數: xiv, 334 p. : : ill. (some col.), digital ;; 24 cm.
    Contained By: Springer eBooks
    標題: Computer science.
    標題: Computer networks.
    標題: Computer Science.
    標題: Systems and Data Security.
    標題: Computer Communication Networks.
    標題: Information Systems Applications (incl. Internet)
    標題: Data Encryption.
    標題: Computer security.
    標題: Data encryption (Computer science)
    ISBN: 9783319411873
    ISBN: 9783319411859
    內容註: Introduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense -- Deception Methods for Offense -- Delays -- Fakes -- Defensive Camouflage -- False Excuses -- Defensive Social Engineering -- Measuring Deception -- Planning Cyberspace Deception -- Software Engineering of Deceptive Software and Systems -- Decoy I/O Devices -- Deception for the Electrical Power Industry -- Law and Ethics for Software Deception.
    摘要、提要註: This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.
    電子資源: http://dx.doi.org/10.1007/978-3-319-41187-3
評論
Export
取書館別
 
 
變更密碼
登入