Deployment methodology of deception technology for effective defense

This paper describes the concept of implementing deception technology as a line of defense for strengthening organizational security backbone. In any of the defense mechanisms if attackers take a lead will result in failure of the defense mechanism. To keep the information protected from the attacke...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Pateria, Jalaj, Ahuja, Laxmi, Som, Subhranil
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!