Advertisement

© 2015

Cyber Denial, Deception and Counter Deception

A Framework for Supporting Active Cyber Defense

  • Provides a framework to systematically implement cyber denial and deception active defenses which can immediately improve security posture

  • Establishes a cyber-counter deception plan

  • Examines the challenges of using deception as part of a security strategy and prepares users to overcome them

  • Includes detailed case studies

Book

Part of the Advances in Information Security book series (ADIS)

Table of contents

  1. Front Matter
    Pages i-xv
  2. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 1-4
  3. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 5-29
  4. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 31-52
  5. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 53-82
  6. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 83-92
  7. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 93-107
  8. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 109-126
  9. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 127-157
  10. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 159-165
  11. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 167-174
  12. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages E1-E1
  13. Back Matter
    Pages 175-251

About this book

Introduction

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme.

The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included.

Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book. 

Keywords

Cyber Security Cyber Defense Cyber Deception Cyber Kill Chain Counter Deception Active Cyber Defense Game Theory Models Intrusion Campaigns Collect Intelligence Sharing Intrusion Detection Vulnerability Assessment

Authors and affiliations

  1. 1.MITRE CorporationMcLeanUSA
  2. 2.MITRE CorporationMcLeanUSA
  3. 3.MITRE CorporationMcLeanUSA
  4. 4.The MITRE CorporationMcLeanUSA
  5. 5.The MITRE CorporationMC LEANUSA

Bibliographic information

  • Book Title Cyber Denial, Deception and Counter Deception
  • Book Subtitle A Framework for Supporting Active Cyber Defense
  • Authors Kristin E. Heckman
    Frank J. Stech
    Roshan K. Thomas
    Ben Schmoker
    Alexander W. Tsow
  • Series Title Advances in Information Security
  • Series Abbreviated Title Adv.Information Security
  • DOI https://doi.org/10.1007/978-3-319-25133-2
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Hardcover ISBN 978-3-319-25131-8
  • Softcover ISBN 978-3-319-37082-8
  • eBook ISBN 978-3-319-25133-2
  • Series ISSN 1568-2633
  • Edition Number 1
  • Number of Pages XV, 251
  • Number of Illustrations 2 b/w illustrations, 28 illustrations in colour
  • Topics Systems and Data Security
    Cryptology
    Information Systems Applications (incl. Internet)
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
IT & Software
Telecommunications
Consumer Packaged Goods
Engineering
Finance, Business & Banking
Electronics
Energy, Utilities & Environment
Aerospace

Reviews

“This appropriately titled book belongs on the bookshelf of information security (InfoSec) professionals everywhere. … Extensive relevant references follow the appendices, and many helpful figures and tables are provided throughout. This noteworthy book is very well organized and presented. … this book is important for virtually everyone in the InfoSec world and is a valuable resource for practitioners as well as researchers.” (M. G. Murphy, Computing Reviews, March, 2016)