Beschreibung:
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.
Examines a broad range of cyberdeception techniques including impersonation, delays, fakes, camouflage, false excuses, and social engineering
Introduction.- Psychology of Deception.- Professional Deception.- Deception Methods for Defense.- Deception Methods for Offense.- Delays.- Fakes.- Defensive Camouflage.- False Excuses.- Defensive Social Engineering.- Measuring Deception.- Planning Cyberspace Deception.- Software Engineering of Deceptive Software and Systems.- Decoy I/O Devices.- Deception for the Electrical Power Industry.- Law and Ethics for Software Deception.