Abstract
For each layer of information security there are a number of techniques and tools that can be used to ensure information superiority. Indeed some experts would argue that you can not have the former without the later. In today's technological & interconnected world though, information superiority is very hard to achieve and almost impossible to maintain. This paper will argue that the art of deception is a reliable and effective technique that can ensure and maintain the security of an infrastructure. The paper will conclude by presenting a technical solution of the above statement.
Original language | English |
---|---|
Title of host publication | ICIW 2007: 2nd International Conference on i-Warfare and Security, 8-9 March 2007 |
Editors | Leigh Armistead |
Place of Publication | UK |
Publisher | Academic Conferences International (ACI) |
Pages | 233-240 |
Number of pages | 8 |
ISBN (Print) | 978-1-905305-41-4 |
Publication status | Published - 8 Mar 2007 |
Event | 2nd International Conference on i-Warfare and Security, ICIW 2007 - Monterey, CA, United States Duration: 8 Mar 2007 → 9 Mar 2007 |
Conference
Conference | 2nd International Conference on i-Warfare and Security, ICIW 2007 |
---|---|
Country/Territory | United States |
City | Monterey, CA |
Period | 8/03/07 → 9/03/07 |
Keywords
- Deception
- Information security
- Information superiority
- Virtual honeypots