Deception in Cyber-Attacks
Rowe, Neil C.
Custy, E. John
MetadataShow full item record
Cyberspace, computers and networks, is now potential terrain of warfare. We describe some effective forms of deception in cyberspace, and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and several other forms of deception. We then speculate on the directions in which cyber-attacks may evolve in the future.
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: The Idea Group, 2007.
Showing items related by title, author, creator and subject.
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2008);We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as ...
Tan, Kheng Lee Gregory (Monterey, California. Naval Postgraduate School, 2003-12);This thesis concerns the possibility of deceiving cyberterrorists using defensive deception methods. As cyberspace today is a battleground for myriad cyber attacks and intrusions, it may only be a matter of time before ...
THE FIFTH MASQUERADE: AN INTEGRATION EXPERIMENT OF MILITARY DECEPTION THEORY AND THE EMERGENT CYBER DOMAIN Green, Justin J. (Monterey, CA; Naval Postgraduate School, 2020-09);For centuries, militaries throughout the world have used deception techniques to gain competitive advantage in warfare. This thesis evaluated the effect of deception with a particular commercial product within cyberspace. ...