Talk With an Expert

Ethical Deception and Preemptive Deterrence in Network Security

Ethical Deception and Preemptive Deterrence in Network Security (PDF, 2.73MB)Published: 17 May, 2005
Created by:
Brian McFarland

Although network perimeter security is not comparable with warfare in terms of morality and the seriousness of the risk to human life, the blackhat threats facing network perimeter security use similar tactics to those used in warfare. Network administrators have several tools in their arsenal for thwarting such attacks such as firewalls and intrusion detection systems. A relatively recent concept developed to compliment existing network defense tools is the Honeypot.