000 03713nam a22005055i 4500
001 978-3-319-41187-3
003 DE-He213
005 20180206183000.0
007 cr nn 008mamaa
008 160923s2016 gw | s |||| 0|eng d
020 _a9783319411873
_9978-3-319-41187-3
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aRowe, Neil C.
_eauthor.
245 1 0 _aIntroduction to Cyberdeception
_h[recurso electrónico] /
_cby Neil C. Rowe, Julian Rrushi.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aXIV, 334 p. 61 illus., 49 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense -- Deception Methods for Offense -- Delays -- Fakes -- Defensive Camouflage -- False Excuses -- Defensive Social Engineering -- Measuring Deception -- Planning Cyberspace Deception -- Software Engineering of Deceptive Software and Systems -- Decoy I/O Devices -- Deception for the Electrical Power Industry -- Law and Ethics for Software Deception.
520 _aThis book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aInformation Systems Applications (incl. Internet).
650 2 4 _aData Encryption.
700 1 _aRrushi, Julian.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319411859
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://dx.doi.org/10.1007/978-3-319-41187-3
912 _aZDB-2-SCS
942 _cLIBRO_ELEC
999 _c225983
_d225983