000 03897nam a22004935i 4500
999 _c200433838
_d52050
003 DE-He213
005 20231104114227.0
007 cr nn 008mamaa
008 151113s2015 gw | s |||| 0|eng d
020 _a9783319251332
_z978-3-319-25133-2
024 7 _a10.1007/978-3-319-25133-2
_2doi
040 _aTR-AnTOB
_beng
_cTR-AnTOB
_erda
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema005.8
_223
100 1 _aHeckman, Kristin E.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aCyber Denial, Deception and Counter Deception :
_bA Framework for Supporting Active Cyber Defense /
_cby Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aAdvances in Information Security,
_x1568-2633
505 0 _aIntroduction -- Bridging the Classical D&D and Cyber Security Domains -- Intrusions, Deceptions, and Campaigns -- Cyber D&D Case Studies -- Exercising Cyber-D&D -- Considerations, Adaptation, and Sharing -- Countering Denial & Deception -- Capability Maturity Model -- Cyber-D&D Lifecycle Management -- Looking to the future.
520 _aThis book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included. Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book. .
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 1 4 _aSystems and Data Security.
_0http://scigraph.springernature.com/things/product-market-codes/I28060
650 2 4 _aCryptology.
_0http://scigraph.springernature.com/things/product-market-codes/I28020
650 2 4 _aInformation Systems Applications (incl. Internet).
_0http://scigraph.springernature.com/things/product-market-codes/I18040
700 1 _aStech, Frank J.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aThomas, Roshan K.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aSchmoker, Ben.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aTsow, Alexander W.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
856 4 0 _3Springer eBooks
_zOnline access link to the resource
_uhttps://doi.org/10.1007/978-3-319-25133-2
942 _2lcc
_cEBK
041 _aeng