Deception in Cyber Attacks

Deception in Cyber Attacks

Neil C. Rowe, E. John Custy
Copyright: © 2007 |Pages: 6
DOI: 10.4018/978-1-59140-991-5.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and several other forms of deception. We then speculate on the directions in which cyber attacks may evolve in the future.

Complete Chapter List

Search this Book:
Reset