Cyber Denial, Deception and Counter Deception (Record no. 52032)

000 -LEADER
fixed length control field 03627nam a22005415i 4500
001 - CONTROL NUMBER
control field 978-3-319-25133-2
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200420220223.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151113s2015 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319251332
-- 978-3-319-25133-2
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Heckman, Kristin E.
245 10 - TITLE STATEMENT
Title Cyber Denial, Deception and Counter Deception
Sub Title A Framework for Supporting Active Cyber Defense /
300 ## - PHYSICAL DESCRIPTION
Number of Pages XV, 251 p. 30 illus., 28 illus. in color.
490 1# - SERIES STATEMENT
Series statement Advances in Information Security,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Bridging the Classical D&D and Cyber Security Domains -- Intrusions, Deceptions, and Campaigns -- Cyber D&D Case Studies -- Exercising Cyber-D&D -- Considerations, Adaptation, and Sharing -- Countering Denial & Deception -- Capability Maturity Model -- Cyber-D&D Lifecycle Management -- Looking to the future.
520 ## - SUMMARY, ETC.
Summary, etc This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book. .
700 1# - AUTHOR 2
Author 2 Stech, Frank J.
700 1# - AUTHOR 2
Author 2 Thomas, Roshan K.
700 1# - AUTHOR 2
Author 2 Schmoker, Ben.
700 1# - AUTHOR 2
Author 2 Tsow, Alexander W.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-25133-2
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2015.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Encryption.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information Systems Applications (incl. Internet).
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1568-2633
912 ## -
-- ZDB-2-SCS

No items available.