Visible to the public Deception technology: Authenticity and why it mattersConflict Detection Enabled

TitleDeception technology: Authenticity and why it matters
Publication TypeMagazine Article
Year of Publication2018
AuthorsEdward Amoroso
MagazineHelp Net Security
EditionFeatured News
Date Published12/13/18
KeywordsCognitive Security, Cognitive Security in Cyber, deception, Deception Technology
Abstract

This article is the second in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of the central role that authenticity plays in the establishment of deception as a practical defense and cyber risk reduction measure.

The primary functional computing requirements for achieving authenticity in deployed deception can be listed as follows: Interface, Performance, Content, Access, and Behavior.

URLhttps://www.helpnetsecurity.com/2018/12/13/deception-technology-authenticity/
Citation Keynode-62721