This presentation, by Dan Houser, CISSP, SSCP, CCP and Security Architect for Nationwide, was given at Information...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Security Decisions Spring 2005.
Security through obscurity is a nasty phrase. Old-time security pros say that obfuscation techniques do little to aid security. New research, however, is showing that digital camouflage can be an effective screen against the persistent onslaught of worms and script kiddies.
In this presentation, Dan Houser guides you through his work in network deception, demonstrating how the creation of virtual machines and a vastly expanded -- but cleverly disguised -- network of bogus targets and services can thwart hackers. In short, taking these steps may cost the hacker too much time and energy to be worth the effort. This presentation reveals:
View the presentation
Visit our hacking tools and techniques resource center