Typical deceptions include concealment, camouflage, false and
planted information, reuses, displays, demonstrations, feints, lies, and
insight.
[Dunnigan95]
Examples include facades used to misdirect attackers as to the
content of a system, false claims that a facility or system is watched by law
enforcement authorities, and Trojan horses planted in software that is down-loaded
from a site.
(e.g., Deception-Toolkit)
(e.g., Deception-Article)
Complexity: Deceptions are one of the most interesting areas of information
protection but little has been done on the specifics of the complexity of
carrying out deceptions. Some work has been done on detecting imperfect
deceptions.
fc@red.a.net