Modern cyber security educational programs that empha-size technical skills often omit or struggle to effectively teach the increasingly important science of cyber decep-tion. A strategy for effectively communicating deceptive technical skills by leveraging the new paradigm of honey-patching is discussed and evaluated. Honey-patches mis-lead attackers into believing that failed attacks against software systems were successful. This facilitates a new form of penetration testing and capture-the-flag style ex-ercise in which students must uncover and outwit the deception in order to successfully bypass the defense. Ex-periences creating and running the first educational lab to employ this new technique are discussed, and educational outcomes a...
In this paper, we address how honeynets, networks of computers intended to be compromised, can be us...
Social engineering penetration testing is a complex but necessary tool to test the security of infor...
Cyber security has come under the spotlight in recent years as cyber-attacks and threats continue to...
Similar to the “Tar Baby ” from Uncle Remus [1], a Honeynet is a system designed to attract troublem...
Honeynets, which are designed to be digital decoys, have proven to be valuable research and teaching...
Nowadays the threat of cyber-attacks is increasing as more organizations undergo digital transformat...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
Traditional software security patches often have the unfortu-nate side-effect of quickly alerting at...
Learning IT Security in a classroom setting has often been a challenging endeavor for both instructo...
The increasing pervasiveness of internet-connected systems means that such systems will continue to ...
© 2016 IEEE. It has become a trend that more and more institutions offer offensive techniques in inf...
Labor market analysis shows that there is a significant shortage of experienced cybersecurity profes...
Cyber deception is used to reverse cyber warfare asymmetry by diverting adversaries to false targets...
"Honeypot" is just a computer system or a network segment, loaded with servers and devices and data...
Since the beginning of the Enterprise IT infrastructures, security remained a major concern for both...
In this paper, we address how honeynets, networks of computers intended to be compromised, can be us...
Social engineering penetration testing is a complex but necessary tool to test the security of infor...
Cyber security has come under the spotlight in recent years as cyber-attacks and threats continue to...
Similar to the “Tar Baby ” from Uncle Remus [1], a Honeynet is a system designed to attract troublem...
Honeynets, which are designed to be digital decoys, have proven to be valuable research and teaching...
Nowadays the threat of cyber-attacks is increasing as more organizations undergo digital transformat...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
Traditional software security patches often have the unfortu-nate side-effect of quickly alerting at...
Learning IT Security in a classroom setting has often been a challenging endeavor for both instructo...
The increasing pervasiveness of internet-connected systems means that such systems will continue to ...
© 2016 IEEE. It has become a trend that more and more institutions offer offensive techniques in inf...
Labor market analysis shows that there is a significant shortage of experienced cybersecurity profes...
Cyber deception is used to reverse cyber warfare asymmetry by diverting adversaries to false targets...
"Honeypot" is just a computer system or a network segment, loaded with servers and devices and data...
Since the beginning of the Enterprise IT infrastructures, security remained a major concern for both...
In this paper, we address how honeynets, networks of computers intended to be compromised, can be us...
Social engineering penetration testing is a complex but necessary tool to test the security of infor...
Cyber security has come under the spotlight in recent years as cyber-attacks and threats continue to...