Introduction to Cyberdeception
Springer International Publishing (Verlag)
978-3-319-41185-9 (ISBN)
Neil C. Rowe is Professor of Computer Science at the U.S. Naval Postgraduate School where he has been since 1983. He has a Ph.D. in Computer Science from Stanford University (1983). His main research interests are in data mining, digital forensics, modeling of deception, and cyberwarfare. Julian Rrushi is an assistant professor with the Department of Computer Science at Western Washington University, Bellingham, WA. He received a PhD in computer science from the University of Milan in 2009. His research is on cyber security, and includes work on industrial control systems. He worked for several years in industry as a vulnerability researcher before accepting a faculty appointment with Western Washington University.
Introduction.- Psychology of Deception.- Professional Deception.- Deception Methods for Defense.- Deception Methods for Offense.- Delays.- Fakes.- Defensive Camouflage.- False Excuses.- Defensive Social Engineering.- Measuring Deception.- Planning Cyberspace Deception.- Software Engineering of Deceptive Software and Systems.- Decoy I/O Devices.- Deception for the Electrical Power Industry.- Law and Ethics for Software Deception.
"The purpose of this book is both to provide a systematic overview of cyberdeception and also to provide a study guide for all readers. ... young researchers, managers, and anyone interested in the problem of cyberdeception will find in this book a great opportunity to learn about the topic. I highly recommend this book for anyone who is looking for an engaging and reader-friendly introduction to cyberdeception." (Eugen Petac, Computing Reviews, April, 2017)
Erscheinungsdatum | 18.10.2016 |
---|---|
Zusatzinfo | XIV, 334 p. 61 illus., 49 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Camouflage • Computer Communication Networks • Computers • Computer Science • data encryption • Deception • decision trees • decoys • Defense • Digital Devices • excuses • Fakes • honeypots • Impersonation • Industrial Control Systems • information systems applications (incl. internet) • I/O Devices • Measurement • Networks • offense • Operating Systems • social engineering • systems and data security • target selection • taxonomies |
ISBN-10 | 3-319-41185-3 / 3319411853 |
ISBN-13 | 978-3-319-41185-9 / 9783319411859 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich