Digital deception: Raising the stakes on hackers
This presentation, by Dan Houser, CISSP, SSCP, CCP and Security Architect for Nationwide, was given at Information Security Decisions Spring 2005.
Security through obscurity is a nasty phrase. Old-time security pros say
that obfuscation techniques do little to aid security. New research, however, is showing that digital camouflage can be an effective screen against the persistent onslaught of worms and script kiddies.
In this presentation, Dan Houser guides you through his work in network deception, demonstrating how the creation of virtual machines and a vastly expanded -- but cleverly disguised -- network of bogus targets and services can thwart hackers. In short, taking these steps may cost the hacker too much time and energy to be worth the effort. This presentation reveals:
The theory behind digital deception
How deception complements existing security solutions
Easily implemented deception techniques
How to make it too expensive in terms of time and resources to hack your site
View the presentation
Visit our hacking tools and techniques resource center
This was first published in May 2005
Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.