Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense /
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&am...
Published in: | Springer eBooks |
---|---|
Main Authors: | , , , , |
Corporate Author: | |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2015.
|
Series: | Advances in Information Security,
|
Subjects: | |
Online Access: | http://dx.doi.org/10.1007/978-3-319-25133-2 Перейти в каталог НБ ТГУ |
LEADER | 03918nam a22005535i 4500 | ||
---|---|---|---|
001 | vtls000560923 | ||
003 | RU-ToGU | ||
005 | 20210922090312.0 | ||
007 | cr nn 008mamaa | ||
008 | 170213s2015 gw | s |||| 0|eng d | ||
020 | |a 9783319251332 |9 978-3-319-25133-2 | ||
024 | 7 | |a 10.1007/978-3-319-25133-2 |2 doi | |
035 | |a to000560923 | ||
039 | 9 | |y 201702130002 |z Александр Эльверович Гилязов | |
040 | |a Springer |c Springer |d RU-ToGU | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
100 | 1 | |a Heckman, Kristin E. |e author. |9 467889 | |
245 | 1 | 0 | |a Cyber Denial, Deception and Counter Deception |h electronic resource |b A Framework for Supporting Active Cyber Defense / |c by Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow. |
260 | |a Cham : |b Springer International Publishing : |b Imprint: Springer, |c 2015. |9 742221 | ||
300 | |a XV, 251 p. 30 illus., 28 illus. in color. |b online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in Information Security, |x 1568-2633 | |
505 | 0 | |a Introduction -- Bridging the Classical D&D and Cyber Security Domains -- Intrusions, Deceptions, and Campaigns -- Cyber D&D Case Studies -- Exercising Cyber-D&D -- Considerations, Adaptation, and Sharing -- Countering Denial & Deception -- Capability Maturity Model -- Cyber-D&D Lifecycle Management -- Looking to the future. | |
520 | |a This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization's mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book. . | ||
650 | 0 | |a Computer Science. |9 155490 | |
650 | 0 | |a Computer security. |9 348012 | |
650 | 0 | |a Data encryption (Computer science). |9 566260 | |
650 | 1 | 4 | |a Computer Science. |9 155490 |
650 | 2 | 4 | |a Systems and Data Security. |9 303939 |
650 | 2 | 4 | |a Data Encryption. |9 566261 |
650 | 2 | 4 | |a Information Systems Applications (incl. Internet). |9 299051 |
700 | 1 | |a Stech, Frank J. |e author. |9 467890 | |
700 | 1 | |a Thomas, Roshan K. |e author. |9 467891 | |
700 | 1 | |a Schmoker, Ben. |e author. |9 467892 | |
700 | 1 | |a Tsow, Alexander W. |e author. |9 467893 | |
710 | 2 | |a SpringerLink (Online service) |9 143950 | |
773 | 0 | |t Springer eBooks | |
830 | 0 | |a Advances in Information Security, |9 566262 | |
856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-319-25133-2 |
856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=415462 | ||
912 | |a ZDB-2-SCS | ||
950 | |a Computer Science (Springer-11645) | ||
999 | |c 415462 |d 415462 |