Designing Good Deceptions in Defense Term Paper

Total Length: 829 words ( 3 double-spaced pages)

Total Sources: 1+

Page 1 of 3

" This approach would also help protect computer systems from unauthorized access by insiders as well, he says (3).

In the spirit of "fight fire with fire," Rowe says that because computer hackers typically use deceptive practices (e.g., impersonation, viruses/worms, and denial of service attacks), it just makes good sense to turn the tables on the hackers by using honeypots and honeynets to collect the kinds of information required to do so. Citing examples from nature, Rowe points out that deception is a common defensive tactic, but it can also be used in a more offensive way by deceiving hackers into staying in the system as long as possible; in some cases, though, the author emphasizes that security considerations would require that the hacker simply be disconnected rather than tricked into staying in the system as long as possible.

Stuck Writing Your "Designing Good Deceptions in Defense" Term Paper?

By keeping the system responses as realistic as possible during these episodes, Rowe suggests that computer security professionals will be in a better position to tie up the hacker's resources while as much information as possible can be collected about them. The author even provides an analysis of how to develop a fuzzy logic approach to determining the hacker's potential to believe in such realistic - but fake - system responses in order to fine-tune them based on a survey of students and faculty. Rowe then offers several vignettes and examples to illustrate how these deceptive responses can be used to defeat unauthorized intrusions and use the data that is collected during the intrusion to develop even better protective approaches in the future (3).

Works.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Designing Good Deceptions In Defense" (2005, October 02) Retrieved May 13, 2024, from
https://www.aceyourpaper.com/essays/designing-good-deceptions-defense-68712

Latest MLA Format (8th edition)

Copy Reference
"Designing Good Deceptions In Defense" 02 October 2005. Web.13 May. 2024. <
https://www.aceyourpaper.com/essays/designing-good-deceptions-defense-68712>

Latest Chicago Format (16th edition)

Copy Reference
"Designing Good Deceptions In Defense", 02 October 2005, Accessed.13 May. 2024,
https://www.aceyourpaper.com/essays/designing-good-deceptions-defense-68712