The purpose of this capstone project was to examine known cyber deception techniques used by cyber criminals in order to enhance end-user awareness. The focal point of the assessment was to research the origin of distinctive cyber deception tactics and study cyber terrorist behaviors to identify gaps in current cyber deception research and develop counter-deceptive tactics that protect valuable computer and infrastructure networks within the United States. This capstone focused on the basic principles and techniques of cyber deception, the relationship of denial and deception tactics, cyber deception vulnerabilities leading to human biases and impaired thinking, and counter deception principles that leave computer networks in a consistent state of cyber threat vulnerability. A thorough examination of a wide range of literature and publications concluded that there is a disturbing lack of communication between military, government, and civilian organizations in regards to the threat of cyber security. Despite current research that identifies common cyber deception tactics, readers will deduce there is inadequate communication from the U.S. government to its civilian counterparts stressing the need to work together in developing mitigation strategies to counter cyber threats.
|Advisor:||Orbinati, Albert, Morales, Ismael|
|School Location:||United States -- New York|
|Source:||MAI 53/05M(E), Masters Abstracts International|
|Subjects:||Information Technology, Criminology, Computer science|
|Keywords:||Computer, Cyber criminal, Cybersecurity, Network, Professor albert orbinati, Threat|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be