Deception in Cyber-Attacks

Loading...
Thumbnail Image
Authors
Rowe, Neil C.
Custy, E. John
Subjects
Advisors
Date of Issue
2007
Date
Publisher
Language
Abstract
Cyberspace, computers and networks, is now potential terrain of warfare. We describe some effective forms of deception in cyberspace, and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and several other forms of deception. We then speculate on the directions in which cyber-attacks may evolve in the future.
Type
Book Chapter
Description
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: The Idea Group, 2007.
Series/Report No
Department
Organization
Identifiers
NPS Report Number
Sponsors
Funder
Format
Citation
Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: The Idea Group, 2007.
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
Collections