Cyber Denial, Deception and Counter Deception

A Framework for Supporting Active Cyber Defense

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber Denial, Deception and Counter Deception by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow ISBN: 9783319251332
Publisher: Springer International Publishing Publication: November 13, 2015
Imprint: Springer Language: English
Author: Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
ISBN: 9783319251332
Publisher: Springer International Publishing
Publication: November 13, 2015
Imprint: Springer
Language: English

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme.

The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included.

Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book. 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme.

The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included.

Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book. 

More books from Springer International Publishing

Cover of the book Refinement Monoids, Equidecomposability Types, and Boolean Inverse Semigroups by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book Identifying and Addressing Childhood Food Insecurity in Healthcare and Community Settings by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book Information Management and Big Data by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book Principle-Based Stepped Care and Brief Psychotherapy for Integrated Care Settings by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book Universal Access in Human-Computer Interaction. Virtual, Augmented, and Intelligent Environments by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book Bio-based Polymers and Nanocomposites by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book Scalable Uncertainty Management by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book Multifocal Intraocular Lenses by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book CT Virtual Hysterosalpingography by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book Coherent Atomic Manipulation and Cooling by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book Democracy and Governance for Resourcing the Commons by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book The United Nations under Ban Ki-moon by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book Statistical Atlases and Computational Models of the Heart. Imaging and Modelling Challenges by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book Green Crime in Mexico by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
Cover of the book Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications by Roshan K. Thomas, Frank J. Stech, Kristin E. Heckman, Ben Schmoker, Alexander W. Tsow
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy