Show simple item record

dc.contributor.authorRowe, Neil C.
dc.contributor.authorMichael, J. Bret
dc.contributor.authorAuguston, Mikhail
dc.contributor.authorRiehle, Richard
dc.dateJune 2002
dc.date.accessioned2013-10-08T17:51:13Z
dc.date.available2013-10-08T17:51:13Z
dc.date.issued2002-06
dc.identifier.citationIANewsletter, June 2002
dc.identifier.urihttp://hdl.handle.net/10945/36819
dc.descriptionThis paper is to appear in IANewsletter, June 2002.en_US
dc.description.abstractSome information systems are critical to defend against malicious attack. Yet they often rely on just the same countermeasures as any system ? firewalls, authentication, intrusion-detection systems, and encryp!tion ? although politically motivated attackers may be far more determined than hackers to bring them down. Future information security will increasingly use ideas from military defensive tactics [3] to effectively defend critical information sys!tems. This will include automatic "counterintelligence" with deliberately deceptive behavior, what we call "software decoys". Decoys can deceive attackers into thinking their attacks have succeeded while protecting key assets at least temporarily.en_US
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleSoftware Decoys for Software Counterintelligenceen_US
dc.typeConference Paperen_US
dc.contributor.departmentComputer Science Department


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record