Advertisement

Cyber Denial, Deception and Counter Deception

A Framework for Supporting Active Cyber Defense

  • Kristin E. Heckman
  • Frank J. Stech
  • Roshan K. Thomas
  • Ben Schmoker
  • Alexander W. Tsow

Part of the Advances in Information Security book series (ADIS)

Table of contents

  1. Front Matter
    Pages i-xv
  2. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 1-4
  3. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 5-29
  4. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 31-52
  5. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 53-82
  6. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 83-92
  7. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 93-107
  8. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 109-126
  9. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 127-157
  10. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 159-165
  11. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages 167-174
  12. Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow
    Pages E1-E1
  13. Back Matter
    Pages 175-251

About this book

Introduction

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme.

The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and discuss trade-offs, maturity models, and lifecycle management. Chapters present the primary challenges in using deception as part of a security strategy, and guides users through the steps to overcome common obstacles. Both revealing and concealing fact and fiction have a critical role in securing private information. Detailed case studies are included.

Cyber Denial, Deception and Counter Deception is designed as a reference for professionals, researchers and government employees working in cybersecurity. Advanced-level students in computer science focused on security will also find this book useful as a reference or secondary text book. 

Keywords

Cyber Security Cyber Defense Cyber Deception Cyber Kill Chain Counter Deception Active Cyber Defense Game Theory Models Intrusion Campaigns Collect Intelligence Sharing Intrusion Detection Vulnerability Assessment

Authors and affiliations

  • Kristin E. Heckman
    • 1
  • Frank J. Stech
    • 2
  • Roshan K. Thomas
    • 3
  • Ben Schmoker
    • 4
  • Alexander W. Tsow
    • 5
  1. 1.MITRE CorporationMcLeanUSA
  2. 2.MITRE CorporationMcLeanUSA
  3. 3.MITRE CorporationMcLeanUSA
  4. 4.The MITRE CorporationMcLeanUSA
  5. 5.The MITRE CorporationMC LEANUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-25133-2
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-25131-8
  • Online ISBN 978-3-319-25133-2
  • Series Print ISSN 1568-2633
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering