University of Hertfordshire

From the same journal

By the same authors

Deception and Maneuver Warfare Utilizing Cloud Resources

Research output: Contribution to journalArticle

Standard

Deception and Maneuver Warfare Utilizing Cloud Resources. / Vidalis, Stilianos; Angelopoulou, Olga.

In: Information Security Journal, Vol. 22, No. 4, 18.11.2013, p. 151-158.

Research output: Contribution to journalArticle

Harvard

APA

Vancouver

Author

Vidalis, Stilianos ; Angelopoulou, Olga. / Deception and Maneuver Warfare Utilizing Cloud Resources. In: Information Security Journal. 2013 ; Vol. 22, No. 4. pp. 151-158.

Bibtex

@article{3d5e0f300cbf49849d358057a7707b3d,
title = "Deception and Maneuver Warfare Utilizing Cloud Resources",
abstract = "In this paper we discuss Maneuver Warfare operations using cloud computing resources and how this can be utilized as part of a 21st century information security model used by the modern SME, operating at a national and international level. Proactive operations for securing digital assets and embedding a deception strategy within Computer Networks Operations can prove to be efficient and cost effective security controls, especially with the exponential increase in highly advanced technology in terms of processing power, storage, and application, coupled with the readily available knowledge through the power of the Internet, accessible by all normal users and threat agents alike.",
keywords = "cloud technologies, computer network operations, information operations, maneuver warfare",
author = "Stilianos Vidalis and Olga Angelopoulou",
year = "2013",
month = nov,
day = "18",
doi = "10.1080/19393555.2013.780273",
language = "English",
volume = "22",
pages = "151--158",
journal = "Information Security Journal",
issn = "1939-3555",
publisher = "Taylor and Francis Ltd.",
number = "4",

}

RIS

TY - JOUR

T1 - Deception and Maneuver Warfare Utilizing Cloud Resources

AU - Vidalis, Stilianos

AU - Angelopoulou, Olga

PY - 2013/11/18

Y1 - 2013/11/18

N2 - In this paper we discuss Maneuver Warfare operations using cloud computing resources and how this can be utilized as part of a 21st century information security model used by the modern SME, operating at a national and international level. Proactive operations for securing digital assets and embedding a deception strategy within Computer Networks Operations can prove to be efficient and cost effective security controls, especially with the exponential increase in highly advanced technology in terms of processing power, storage, and application, coupled with the readily available knowledge through the power of the Internet, accessible by all normal users and threat agents alike.

AB - In this paper we discuss Maneuver Warfare operations using cloud computing resources and how this can be utilized as part of a 21st century information security model used by the modern SME, operating at a national and international level. Proactive operations for securing digital assets and embedding a deception strategy within Computer Networks Operations can prove to be efficient and cost effective security controls, especially with the exponential increase in highly advanced technology in terms of processing power, storage, and application, coupled with the readily available knowledge through the power of the Internet, accessible by all normal users and threat agents alike.

KW - cloud technologies

KW - computer network operations

KW - information operations

KW - maneuver warfare

UR - http://www.scopus.com/inward/record.url?scp=84888122538&partnerID=8YFLogxK

U2 - 10.1080/19393555.2013.780273

DO - 10.1080/19393555.2013.780273

M3 - Article

AN - SCOPUS:84888122538

VL - 22

SP - 151

EP - 158

JO - Information Security Journal

JF - Information Security Journal

SN - 1939-3555

IS - 4

ER -