000 03627nam a22005415i 4500
001 978-3-319-25133-2
003 DE-He213
005 20200420220223.0
007 cr nn 008mamaa
008 151113s2015 gw | s |||| 0|eng d
020 _a9783319251332
_9978-3-319-25133-2
024 7 _a10.1007/978-3-319-25133-2
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aHeckman, Kristin E.
_eauthor.
245 1 0 _aCyber Denial, Deception and Counter Deception
_h[electronic resource] :
_bA Framework for Supporting Active Cyber Defense /
_cby Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _aXV, 251 p. 30 illus., 28 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633
505 0 _aIntroduction -- Bridging the Classical D&D and Cyber Security Domains -- Intrusions, Deceptions, and Campaigns -- Cyber D&D Case Studies -- Exercising Cyber-D&D -- Considerations, Adaptation, and Sharing -- Countering Denial & Deception -- Capability Maturity Model -- Cyber-D&D Lifecycle Management -- Looking to the future.
520 _aThis book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book. .
650 0 _aComputer science.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aData Encryption.
650 2 4 _aInformation Systems Applications (incl. Internet).
700 1 _aStech, Frank J.
_eauthor.
700 1 _aThomas, Roshan K.
_eauthor.
700 1 _aSchmoker, Ben.
_eauthor.
700 1 _aTsow, Alexander W.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319251318
830 0 _aAdvances in Information Security,
_x1568-2633
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-25133-2
912 _aZDB-2-SCS
942 _cEBK
999 _c52032
_d52032