Deception in Cyber Attacks

Deception in Cyber Attacks

Neil C. Rowe (U.S. Naval Postgraduate School, USA) and E. John Custy (U.S. Naval Postgraduate School, USA)
Copyright: © 2007 |Pages: 6
DOI: 10.4018/978-1-59140-991-5.ch012
OnDemand PDF Download:
No Current Special Offers


Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and several other forms of deception. We then speculate on the directions in which cyber attacks may evolve in the future.

Complete Chapter List

Search this Book: