Deceptive Defense Examples
False and planted information
Perception management
Rerouting attacks
Ruses
Attractive Web site as a lure
Embedded content as a detection mechanism
Displays
Weak encryption
Demonstrations
Widely publicized prosecutions
Previous slide
Next slide
Back to first slide
View graphic version