Back to Search
Start Over
A Model of Deploying Deception in a Computer Network Operations (CNO) Environment.
- Source :
- EC2ND 2005; 2006, p83-93, 11p
- Publication Year :
- 2006
-
Abstract
- The concept of deception has been practised in human conflicts ever since they existed, but its application to an information security environment could only be witnessed in the early 1990s onwards. Since then, different deception techniques have also been introduced to the Computer Network Operations (CNO) environment, in order to achieve desired outcome(s). In the recent years, a number of researchers have investigated in different deception techniques used in computer based networks but more consideration is needed in exploring the strategic deception in a Computer Network Defence (CND) environment. To date, there are no models available that would allow strategic deception in a CNO environment and therefore building such model would be a great achievement. This paper aims to establish an understanding of the role of deception in a CNO environment and will also discuss a draft concept of a deception model that will allow strategic deception in a CNO environment. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISBNs :
- 9781846283116
- Database :
- Supplemental Index
- Journal :
- EC2ND 2005
- Publication Type :
- Book
- Accession number :
- 34015625
- Full Text :
- https://doi.org/10.1007/1-84628-352-3_9