Deception and Maneuver Warfare Utilizing Cloud Resources

Stilianos Vidalis, Olga Angelopoulou

Research output: Contribution to journalArticlepeer-review

Abstract

In this paper we discuss Maneuver Warfare operations using cloud computing resources and how this can be utilized as part of a 21st century information security model used by the modern SME, operating at a national and international level. Proactive operations for securing digital assets and embedding a deception strategy within Computer Networks Operations can prove to be efficient and cost effective security controls, especially with the exponential increase in highly advanced technology in terms of processing power, storage, and application, coupled with the readily available knowledge through the power of the Internet, accessible by all normal users and threat agents alike.

Original languageEnglish
Pages (from-to)151-158
Number of pages8
JournalInformation Security Journal
Volume22
Issue number4
DOIs
Publication statusE-pub ahead of print - 18 Nov 2013

Keywords

  • cloud technologies
  • computer network operations
  • information operations
  • maneuver warfare

Fingerprint

Dive into the research topics of 'Deception and Maneuver Warfare Utilizing Cloud Resources'. Together they form a unique fingerprint.

Cite this