1. A Discussion on the Role of Deception in Information Operations for the Defence of Computer Networks.
- Author
-
Kazmi, Zafar and Tryfonas, Theodore
- Abstract
Deception has been widely deployed in human conflicts, but its application to information security could only be witnessed since the early 1990s. Different deception techniques have been proposed as part of computer-based information operations (IO), in order to facilitate specific warfare campaigns. In the recent years, a number of researchers have investigated different deception techniques used in computer-based networks, such as honeypots and honeynets, but in the light of several emerging issues more consideration is required in exploring deception as a strategic capability for Computer Network Defence (CND). In this discussion paper we address the potentially important role that deception can play for CND, similarly to its important role within conventional warfare and IO. We also highlight issues of further research towards the integration of deception in information security practices. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF