Reference Hub7
Deception in Cyber Attacks

Deception in Cyber Attacks

Neil C. Rowe, E. John Custy
Copyright: © 2007 |Pages: 6
ISBN13: 9781591409915|ISBN10: 1591409918|ISBN13 Softcover: 9781616927493|EISBN13: 9781591409922
DOI: 10.4018/978-1-59140-991-5.ch012
Cite Chapter Cite Chapter

MLA

Rowe, Neil C., and E. John Custy. "Deception in Cyber Attacks." Cyber Warfare and Cyber Terrorism, edited by Lech Janczewski and Andrew Colarik, IGI Global, 2007, pp. 91-96. https://doi.org/10.4018/978-1-59140-991-5.ch012

APA

Rowe, N. C. & Custy, E. J. (2007). Deception in Cyber Attacks. In L. Janczewski & A. Colarik (Eds.), Cyber Warfare and Cyber Terrorism (pp. 91-96). IGI Global. https://doi.org/10.4018/978-1-59140-991-5.ch012

Chicago

Rowe, Neil C., and E. John Custy. "Deception in Cyber Attacks." In Cyber Warfare and Cyber Terrorism, edited by Lech Janczewski and Andrew Colarik, 91-96. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59140-991-5.ch012

Export Reference

Mendeley
Favorite

Abstract

Cyberspace, computers, and networks are now potential terrain of warfare. We describe some effective forms of deception in cyberspace and discuss how these deceptions are used in attacks. After a general assessment of deception opportunities in cyberspace, we consider various forms of identity deceptions, denial-of-service attacks, Trojan horses, and several other forms of deception. We then speculate on the directions in which cyber attacks may evolve in the future.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.