Digital deception: Raising the stakes on hackers

Learn the theory behind digital deception and how to implement digital deception techniques.

This presentation, by Dan Houser, CISSP, SSCP, CCP and Security Architect for Nationwide, was given at Information...

Security Decisions Spring 2005.


Security through obscurity is a nasty phrase. Old-time security pros say that obfuscation techniques do little to aid security. New research, however, is showing that digital camouflage can be an effective screen against the persistent onslaught of worms and script kiddies.

In this presentation, Dan Houser guides you through his work in network deception, demonstrating how the creation of virtual machines and a vastly expanded -- but cleverly disguised -- network of bogus targets and services can thwart hackers. In short, taking these steps may cost the hacker too much time and energy to be worth the effort. This presentation reveals:

  • The theory behind digital deception
  • How deception complements existing security solutions
  • Easily implemented deception techniques
  • How to make it too expensive in terms of time and resources to hack your site
  • And more

    View the presentation

    Visit our hacking tools and techniques resource center


  • This was last published in May 2005

    Dig Deeper on Network Intrusion Prevention (IPS)

    PRO+

    Content

    Find more PRO+ content and other member only offers, here.

    Start the conversation

    Send me notifications when other members comment.

    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

    Please create a username to comment.

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close