You are on page 1of 12

DECEPTION

Deception
• Idea: creating a false perception of the attack
surface for an adversary.
Schema
Importance of Deception
• Inevitability of attacks 
• Context-awareness of attacks
Advantages
• High value to cost ratio
• Supports strategic analysis
• Ease of deployment and use
Honey pot methods
• Idea: by placing specially crafted information,
services, data, or other resources considered
attractive to an adversary, the associated
deceptive system would be successful in
establishing persistence of that actor with the
trap.
Life cycle of Honeypot
Basic schema for deception in
computing
Cryptography
• Cryptography is the process of hiding or
coding information so that only the person a
message was intended for can read it.
• The art of cryptography has been used to
code messages for thousands of years and
continues to be used in bank cards, computer
passwords, and ecommerce.
Types of Cryptographic Algorithms

• Secret Key Cryptography - Single key to


encrypt and decrypt a message.
• Stream Ciphers - Single bit or byte at any time
and constantly change the key using feedback
mechanisms.
• Block Ciphers -  Encrypt one block of fixed-size
data at a time.
Public Key Cryptography
• Uses mathematical functions to create codes
that are exceptionally difficult to crack.
• Multiplication vs. factorization, which takes
two large prime numbers and multiplies them
to create a huge resulting number that makes
deciphering difficult.
• Exponentiation vs. logarithms such as 256-bit
encryption.
Security models

You might also like