Show simple item record

dc.contributor.authorRowe, Neil C.
dc.contributor.authorCusty, E. John
dc.date.accessioned2013-09-18T16:25:21Z
dc.date.available2013-09-18T16:25:21Z
dc.date.issued2007
dc.identifier.citationCyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: The Idea Group, 2007.
dc.identifier.urihttp://hdl.handle.net/10945/36422
dc.descriptionThis is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: The Idea Group, 2007.en_US
dc.description.abstractCyberspace, computers and networks, is now potential terrain of warfare. We describe some effective forms of deception in cyberspace, and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and several other forms of deception. We then speculate on the directions in which cyber-attacks may evolve in the future.en_US
dc.rightsApproved for public release, distribution unlimiteden_US
dc.titleDeception in Cyber-Attacksen_US
dc.typeBook Chapteren_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record