Professional Documents
Culture Documents
DECEPTION, CRYPTOGRAPHY, Security Models
DECEPTION, CRYPTOGRAPHY, Security Models
Deception
• Idea: creating a false perception of the attack
surface for an adversary.
Schema
Importance of Deception
• Inevitability of attacks
• Context-awareness of attacks
Advantages
• High value to cost ratio
• Supports strategic analysis
• Ease of deployment and use
Honey pot methods
• Idea: by placing specially crafted information,
services, data, or other resources considered
attractive to an adversary, the associated
deceptive system would be successful in
establishing persistence of that actor with the
trap.
Life cycle of Honeypot
Basic schema for deception in
computing
Cryptography
• Cryptography is the process of hiding or
coding information so that only the person a
message was intended for can read it.
• The art of cryptography has been used to
code messages for thousands of years and
continues to be used in bank cards, computer
passwords, and ecommerce.
Types of Cryptographic Algorithms