|
![]() |
|||
|
||||
OverviewThis book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role insecuring private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book. Full Product DetailsAuthor: Kristin E. Heckman , Frank J. Stech , Roshan K. Thomas , Ben SchmokerPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: Softcover reprint of the original 1st ed. 2015 Volume: 64 Weight: 4.161kg ISBN: 9783319370828ISBN 10: 3319370820 Pages: 251 Publication Date: 23 August 2016 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsReviewsThis appropriately titled book belongs on the bookshelf of information security (InfoSec) professionals everywhere. ... Extensive relevant references follow the appendices, and many helpful figures and tables are provided throughout. This noteworthy book is very well organized and presented. ... this book is important for virtually everyone in the InfoSec world and is a valuable resource for practitioners as well as researchers. (M. G. Murphy, Computing Reviews, March, 2016) Author InformationTab Content 6Author Website:Countries AvailableAll regions |