[Cohen98-1] F. Cohen, A Note on the Role of Deception in Information Protection
,Computers and Security, 1998. [This paper concentrates on the role of deception in information protection, and as such, its main focus is on
addressing different perspectives on deception. We begin by examining the historical use of deception for
information protection in more depth, consider the moral issues associated with the use of deception for protection,
and examine techniques for deceptive defense and complexities in their use. Next we describe theoretical issues
behind the use of deception in the Deception ToolKit (DTK), practical results on the use of DTK in the Internet and
in an experimental environment, and notions about the widespread use of DTK and similar tools. Finally, we
summarize results, draw conclusions, and discuss further work.]
Drill Down
fc@red.all.net