Confronting cyberterrorism with cyber deception
Tan, Kheng Lee Gregory
Rowe, Neil C.
Denning, Dorothy E.
MetadataShow full item record
This thesis concerns the possibility of deceiving cyberterrorists using defensive deception methods. As cyberspace today is a battleground for myriad cyber attacks and intrusions, it may only be a matter of time before terrorists choose to advance their deadly cause in cyberspace. We explore some of the questions raised regarding the threat of cyberterrorism by examining different perspectives, motivations, actors, targets, and how they may be confronted. One way is to draw from the lessons of deception and apply them against cyberterrorist attacks. Cyber deception applies in cyberspace just as well as deception in military battles. From the different categories of attackers that could perpetrate cyberterrorism, we examine the ways in which they may be deceived. Many of the methods and tools that cyberterrorists would use are similar to those used by other less malicious hackers, so we can plan specific deceptions to use against them in advance.
RightsCopyright is reserved by the copyright owner
Showing items related by title, author, creator and subject.
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2008);We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as ...
THE FIFTH MASQUERADE: AN INTEGRATION EXPERIMENT OF MILITARY DECEPTION THEORY AND THE EMERGENT CYBER DOMAIN Green, Justin J. (Monterey, CA; Naval Postgraduate School, 2020-09);For centuries, militaries throughout the world have used deception techniques to gain competitive advantage in warfare. This thesis evaluated the effect of deception with a particular commercial product within cyberspace. ...
Rowe, Neil C.; Custy, E. John (2007);Cyberspace, computers and networks, is now potential terrain of warfare. We describe some effective forms of deception in cyberspace, and discuss how these deceptions are used in attacks. After a general assessment of ...