Deception technology: Authenticity and why it matters
Title | Deception technology: Authenticity and why it matters |
Publication Type | Magazine Article |
Year of Publication | 2018 |
Authors | Edward Amoroso |
Magazine | Help Net Security |
Edition | Featured News |
Date Published | 12/13/18 |
Keywords | Cognitive Security, Cognitive Security in Cyber, deception, Deception Technology |
Abstract | This article is the second in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of the central role that authenticity plays in the establishment of deception as a practical defense and cyber risk reduction measure. The primary functional computing requirements for achieving authenticity in deployed deception can be listed as follows: Interface, Performance, Content, Access, and Behavior. |
URL | https://www.helpnetsecurity.com/2018/12/13/deception-technology-authenticity/ |
Citation Key | node-62721 |