首页 | 本学科首页   官方微博 | 高级检索  
     


Security Through Deception
Authors:Stilianos Vidalis  Zafar Kazmi
Affiliation:University of Glamorgan , UK
Abstract:ABSTRACT

For each layer of information security there is a number of techniques and tools that can be used to ensure information superiority. Indeed some experts would argue that you cannot have the former without the latter. In today's technological & interconnected world, however, information superiority is very hard to achieve and almost impossible to maintain. This paper will argue that the art of deception is a reliable and cost effective technique that can assure the security of an infrastructure. The paper will conclude by presenting a technical solution of the above statement.
Keywords:deception  information security  information superiority  virtual honeypots
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号