Overview
- Examines a broad range of cyberdeception techniques including impersonation, delays, fakes, camouflage, false excuses, and social engineering
- Provides more breadth of coverage than any competing book
- Uses a student-friendly format with exercises, minimal mathematics, and extensive references
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application.
Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.
Similar content being viewed by others
Keywords
Table of contents (16 chapters)
Reviews
Authors and Affiliations
About the authors
Julian Rrushi is an assistant professor with the Department of Computer Science at Western Washington University, Bellingham, WA. He received a PhD in computer science from the University of Milan in 2009. His research is on cyber security, and includes work on industrial control systems. He worked for several years in industry as a vulnerability researcher before accepting a faculty appointment with Western Washington University.
Bibliographic Information
Book Title: Introduction to Cyberdeception
Authors: Neil C. Rowe, Julian Rrushi
DOI: https://doi.org/10.1007/978-3-319-41187-3
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2016
Hardcover ISBN: 978-3-319-41185-9Published: 04 October 2016
Softcover ISBN: 978-3-319-82288-4Published: 30 April 2018
eBook ISBN: 978-3-319-41187-3Published: 23 September 2016
Edition Number: 1
Number of Pages: XIV, 334
Number of Illustrations: 12 b/w illustrations, 49 illustrations in colour
Topics: Systems and Data Security, Computer Communication Networks, Information Systems Applications (incl. Internet), Cryptology