Skip to search
Skip to main content
Catalog
Help
Feedback
Your Account
Library Account
Bookmarks
(
0
)
Search History
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS
Printer
Bookmark
Introduction to cyberdeception / Neil C. Rowe, Julian Rrushi.
Author
Rowe, Neil C.
[Browse]
Format
Book
Language
English
Published/Created
Cham ; Springer, [2016]
©2016
Description
xiv, 334 pages : illustrations ; 25 cm
Availability
Copies in the Library
Location
Call Number
Status
Location Service
Notes
Engineering Library - Stacks
QA76.9.A25 R69 2016
Browse related items
Request
Details
Subject(s)
Computer security
[Browse]
Data encryption (Computer science)
[Browse]
Computer science
[Browse]
Computer networks
[Browse]
Author
Rrushi, Julian
[Browse]
Summary note
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems. .
Bibliographic references
Includes bibliographical references.
Contents
Introduction
Psychology of Deception
Professional Deception
Deception Methods for Defense
Deception Methods for Offense
Delays
Fakes
Defensive Camouflage
False Excuses
Defensive Social Engineering
Measuring Deception
Planning Cyberspace Deception
Software Engineering of Deceptive Software and Systems
Decoy I/O Devices
Deception for the Electrical Power Industry
Law and Ethics for Software Deception.
Show 13 more Contents items
ISBN
9783319411859
3319411853
OCLC
950953461
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Ask a Question
Suggest a Correction
Report Harmful Language
Supplementary Information