Back to Results
First PageMeta Content
Spamming / Deception / Decoy / Crime / Behavior / Computer network security / Honeypot


The Use of Deception Techniques: Honeypots and Decoys Fred Cohen 1. Backgroun d and History 1.1 Deception Funda me n t als
Add to Reading List

Document Date: 2008-02-12 17:08:23


Open Document

File Size: 526,19 KB

Share Result on Facebook

Company

AT&T / /

Facility

Form Complex / /

IndustryTerm

technology area / law suits / Internet Lightning Rods / legitimate services / Internet Protocol / der technology / substa ntial tool / purpose tools / fictitious services / Software decoys / real services / counterintelligence tool / main line tool / infor ma tion technology arena / /

Movie

The Art of War / /

OperatingSystem

Linux / /

Organization

National Research Council / Graduate School / Central Intelligence Agency / United Nations / /

Person

Jesus Torres / Bob Fellows / Fred Cohen / Charles Handy / Al Seckel / Charles K. West / Fay Faron / Glen Sharlun / Chuck Whitlock / Khrushchev / Donald D. Hoffma / David Lambert / /

Position

cognitive model / atte mp / individual researcher / mp / deception designer / researcher / /

ProgrammingLanguage

Perl / Lisp / /

ProvinceOrState

British Columbia / /

Technology

encryption / Respon der technology / Linux / IP / Perl / DWALL technology / simulation / Wall technology / ado / flash / /

SocialTag