Visible to the public Biblio

Filters: Author is Edward Amoroso  [Clear All Filters]
2019-09-26
Edward Amoroso.  2018.  Deception technology: Authenticity and why it matters. Help Net Security.

This article is the second in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks. The article provides an overview of the central role that authenticity plays in the establishment of deception as a practical defense and cyber risk reduction measure.

The primary functional computing requirements for achieving authenticity in deployed deception can be listed as follows: Interface, Performance, Content, Access, and Behavior.
 

2019-09-25
Edward Amoroso.  2018.  An introduction to deception technology. Help Net Security.

The evolution of modern enterprise networking has progressed to the point where two conditions make deception an important and urgent control to introduce to a target environment now: Inevitability of attacks and Context-awareness of attacks.