Skip to main content
Erschienen in:
Buchtitelbild

2015 | OriginalPaper | Buchkapitel

1. Introduction

verfasst von : Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow

Erschienen in: Cyber Denial, Deception and Counter Deception

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The world has become ever more reliant on computers for critical infrastructure, communications, and commercial operations. The security of computer systems now affects billions of lives, yet architectural and legacy decisions and consequent vulnerabilities allow malicious actors to compromise sensitive information and deny access to legitimate users. In addition, intrusions by dedicated actor groups appear to have become more persistent, threatening, and global (Jajodia et al. 2011).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Symantec Internet Security Threat Report 2011.
 
2
One cyber security company defines an APT as “a group of sophisticated, determined and coordinated attackers that have been systematically compromising … government and commercial computer networks for years. … well-funded, organized groups of attackers. … They are professionals, and their success rate is impressive.” Mandiant (2010) M-Trends: The advance of the persistent threat. https://​www.​mandiant.​com/​resources/​mandiant-reports/​
 
3
Bodmer, S., M. Kilger, G. Carpenter, and J. Jones (2012) Reverse Deception: Organized Cyber Threat Counter-Exploitation. McGraw-Hill: New York, pp. 31–32.
 
4
Although the concept of D&D is well known and has been used to great effect in the physical world, it has received less attention in the cyber domain. However, there are some notable exceptions of systematic research on cyber deception. For example, Janczewski and Colarik’s (2008) Cyber warfare and cyber terrorism published several interesting research papers on cyber deception by Neil C. Rowe (and colleagues) at the Naval Postgraduate School. Professor Rowe has published extensively on cyber deception. Research on cyber deception has also been performed at Dartmouth College’s Institute for Security, Technology, and Society (ISTS) by (among others) Professors George Cybenko, Eugene Santos, and Paul Thompson; and at Columbia University by Professors Salvatore J. Stolfo and Angelos D. Keromytis.
 
5
James J. Yuill. “Defensive Computer-Security Deception Operations: Processes, Principles and Techniques.” Dissertation: North Carolina State University, Raleigh NC, 2006, p. 1.
 
6
Frank Stech, Kristin E. Heckman, Phil Hilliard, and Janice R. Ballo. “Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space,” PsychNology Journal, v. 9, no. 2, pp. 79–122, 2011.
 
Literatur
Zurück zum Zitat Amoroso, E. G. (2011) Cyber attacks : protecting national infrastructure. Burlington, MA: Butterworth-Heinemann. Amoroso, E. G. (2011) Cyber attacks : protecting national infrastructure. Burlington, MA: Butterworth-Heinemann.
Zurück zum Zitat Jajodia, S., Ghosh, A. K., Swarup, V., & Wang, C. (2011) Moving target defense : creating asymmetric uncertainty for cyber threats. New York: Springer. Jajodia, S., Ghosh, A. K., Swarup, V., & Wang, C. (2011) Moving target defense : creating asymmetric uncertainty for cyber threats. New York: Springer.
Zurück zum Zitat Janczewski, L., & Colarik, A. M. (2008) Cyber warfare and cyber terrorism. London: Information Science Reference. Janczewski, L., & Colarik, A. M. (2008) Cyber warfare and cyber terrorism. London: Information Science Reference.
Zurück zum Zitat Smith, D. L. (2004). Why we lie : the evolutionary roots of deception and the unconscious mind. New York: St. Martin’s Press. Smith, D. L. (2004). Why we lie : the evolutionary roots of deception and the unconscious mind. New York: St. Martin’s Press.
Metadaten
Titel
Introduction
verfasst von
Kristin E. Heckman
Frank J. Stech
Roshan K. Thomas
Ben Schmoker
Alexander W. Tsow
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-25133-2_1