Deception for Cyber-Attack
Most historical cyber-attacks are based on deceptions - e.g.,
- Shoulder surfing
- IP address forgery
- Network scanning
- Trojan horses
- Viruses
- Wire closet attacks
- Perception management
- Man-in-the-middle
-
Most historical cyber-defenses are not based on deceptions - e.g.,
- Mandatory access control
- Strong passwords
- Physical barriers
- Time-based restrictions
- Location-based restrictions
- Audit and audit analysis
- Training and awareness