Biblio
This article is the second in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of the central role that authenticity plays in the establishment of deception as a practical defense and cyber risk reduction measure.
The primary functional computing requirements for achieving authenticity in deployed deception can be listed as follows: Interface, Performance, Content, Access, and Behavior.
The evolution of modern enterprise networking has progressed to the point where two conditions make deception an important and urgent control to introduce to a target environment now: Inevitability of attacks and Context-awareness of attacks.