Security and Privacy in the Age of Uncertainty 2003
DOI: 10.1007/978-0-387-35691-4_50
|View full text |Cite
|
Sign up to set email alerts
|

Lawful Cyber Decoy Policy

Abstract: Abstract:Cyber decoys provide a means for automating, to a degree, counterintelligence activities and responses to cyber attacks. Like other security mechanisms for protecting information systems, it is likely that cyber decoys will in some instances be misused. In the United States, criminal law provides us with analogies for preventing or punishing improper state use of deception, and criminal and civil law give us a range of tools to use against private actors. However, in addition to states, nongovernmenta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2004
2004
2019
2019

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Recovering and/or restoring damaged system(s) and service(s) back to original state(s) do not belong to reaction since we believe that they are basically pertained to reconstruction performed after the end of the conflict, which is not the scope of the defense. Some of Reaction strategies are deception [29,32,33], delay [25], and isolation of attackers [21,29,34].…”
Section: Time Dimensionmentioning
confidence: 99%
“…Recovering and/or restoring damaged system(s) and service(s) back to original state(s) do not belong to reaction since we believe that they are basically pertained to reconstruction performed after the end of the conflict, which is not the scope of the defense. Some of Reaction strategies are deception [29,32,33], delay [25], and isolation of attackers [21,29,34].…”
Section: Time Dimensionmentioning
confidence: 99%
“…Like their commercial analogs, they provide quick and reliable access to the documents themselves, but are not designed to assist in the legal analysis per se. The University of Minnesota's Human Rights Library is an excellent example, and is the source of UN Charter text provided in one of our examples [10].…”
Section: Related Workmentioning
confidence: 99%
“…In light of the ever growing number and complexity of cyberattacks, it is necessary to find more novel solutions to defend our cyber networks and critical infrastructure. Inception has been proposed as an effective way to defend our networks and ward off attackers, for the best defense is a great offense (Michael & Wingfield, 2003;Mitnick & Simon, 2011;Rowe & Goh, 2007). Fighting deception with reverse deception thwarts the assumptions of attackers and allows defenders to defend systems and information dynamically rather than after attacks have already occurred (dynamic defense).…”
Section: Introductionmentioning
confidence: 99%