because when an intruder attempts to enter the real network they will be

Because when an intruder attempts to enter the real

This preview shows page 9 - 12 out of 16 pages.

because when an intruder attempts to enter the real network they will be directed to the false network and security will be notified immediately. Additionally, the decoys are not accessed by legitimate users so there are almost no false positives with the above techniques. Also, through this technique’s intruders are noticed quickly than if security had to wait for malware detection-based alerts to be notified Implementation of deception principle: During the traditional cybersecurity, most companies used to play cat and mouse game to identify and block threats. But with the emergence of deception program, things change for the better because the deception program provides defenders with the ability to learn about attackers in the same way attackers learn about their targets. So, IT teams can use
Image of page 9
deception technique to monitor the attacker's behaviour and moves once they notice their presence. It helps the team to understand what the intention of the attack and they will act accordingly to prevent further damage. According to study, people have been thinking that deception program could be made out of strategically trapped and implemented across the energy sector components and tied up with kind of main analysis of the deception ( Onyeji, Bazilian & Bronk (2014). But that is not the case because the project is well its only that it has not been interpreted well. The management of the energy sector has had been slow in accepting the traps planted in the production system and it might lead to malfunctioning. When you look at the present security issues with information technology interpretations it always suggests that the high amount of user's empress deception protect the energy sector infrastructure. So below are the ways deception program can be designed better; Selective infrastructure: We must assume some of the components of energy sectors are mostly include these deception traps and other tools don’t include and at the time of implementing these infrastructure teams are still struggling with basic security system concepts. The whole idea is it’s not the acceptable way to set traps, in
Image of page 10
the same way, deception concept must realize that all the concepts don’t go as planned. Sharing results and insights: These programs of deception should include the theory of sharing insights and results through operational traps. Challenges of implementing deception program The concept of deception has to undergo three major milestones to achieve its goal. They include; They should be able to cover up the attacking surfaces They should be simple and easy to operate and interpret They should be attractive and strong. Most of the attackers are aware of deception technology and therefore they have to be able to work out when they have run up against what is essentially a phoney. According to research deception are only valuable when they are viable. This means that when an attacker finds something appealing or attractive, they will continue to engage with and imparts intelligence to the deployer. Another challenge is that during practice it
Image of page 11
Image of page 12

You've reached the end of your free preview.

Want to read all 16 pages?

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes