Skip to main content

Introduction

  • Chapter
  • First Online:
Introduction to Cyberdeception
  • 1525 Accesses

Abstract

It's a war out there. Security of our computer systems and networks (“cybersystems”) is under serious attack these days from a variety of malicious people: cybercriminals, spies (both government and industrial), disgruntled insiders within organizations, amateur “hackers” (Poulsen 2012), and terrorists (Colarik 2006). They exploit flaws in software to misuse it for their own ends of making money, advancing their agendas, and enjoying power over others.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Bailey F (1988) Humbuggery and manipulation: the art of leadership. Cornell University Press, Ithaca, NY

    Google Scholar 

  • Bell J, Whaley B (1991) Cheating. Transaction, New York

    Google Scholar 

  • Berghel H (2006) Phishing mongers and posers. Commun ACM 49(4):21–25

    Article  Google Scholar 

  • Bodmer S, Kilger A, Carpenter G, Jones J (2012) Reverse deception: organized cyber threat counter-exploitation. McGraw-Hill Education, New York

    Google Scholar 

  • Bok S (1978) Lying: moral choice in public and private life. Pantheon, New York

    Google Scholar 

  • Carson T (2010) Lying and deception: theory and practice. Oxford University Press, Oxford, UK

    Book  Google Scholar 

  • Castelfranchi C (2000) Artificial liars: why computers will (necessarily) deceive us and each other. Ethics Inf Technol 2(2):113–119

    Article  Google Scholar 

  • Chapple M, Ballad B, Ballad T, Banks E (2013) Access control, authentication, and public key infrastructure, 2nd edn. Jones and Bartlett, New York

    Google Scholar 

  • Colarik A (2006) Cyber terrorism: political and economic implications. IGI Global, Hershey, PA

    Book  Google Scholar 

  • Elisan C (2012) Malware, rootkits, and botnets: a beginner’s guide. McGraw-Hill Education, New York

    Google Scholar 

  • Granhag P, Vrij A, Verschuere B (eds) (2015) Detecting deception: current challenges and cognitive approaches. Wiley-Blackwell, Chichester, UK

    Google Scholar 

  • Hoglund G, McGraw G (2007) Exploiting online games: cheating massively distributed systems. Addison-Wesley, Upper Saddle River, NJ

    Google Scholar 

  • Lucasik S, Goodman S, Longhurst D (2003) National strategies for protection of critical infrastructures from cyber-attack. London, Oxford

    Google Scholar 

  • Poulsen K (2012) Kingpin: how one hacker took over the billion-dollar cybercrime underground. Broadway, New York

    Google Scholar 

  • Quinn M (2006) Ethics for the information age. Pearson Addison-Wesley, Boston, MA

    Google Scholar 

  • Rothstein H, Whaley B (eds) (2013) The art and science of military deception. Artech House, New York

    Google Scholar 

  • Smith D (2007) Why we lie: the evolutionary roots of deception and the unconscious mind. St. Martin’s Griffin, New York

    Google Scholar 

  • Trost R (2009) Practical intrusion analysis: prevention and detection for the twenty-first century. Addison-Wesley, Upper Saddle River, NJ

    Google Scholar 

  • Vidalis S, Kazmi S (2007) Security through deception. Inf Syst Secur 16:34–41

    Article  Google Scholar 

  • Weidman G (2014) Penetration testing: a hands-on introduction to hacking. No Starch, New York

    Google Scholar 

  • Wyler N (ed) (2005) Aggressive network self-defense. Syngress, Rockland, MA

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rowe, N.C., Rrushi, J. (2016). Introduction. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41187-3_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41185-9

  • Online ISBN: 978-3-319-41187-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics