Deceptive Defense Examples
Feints
Announced policies of returning fire, etc.
Lies
Feeding false information
Isolated sub-file-system areas
Traps
Insight
Model-based situation anticipation and constraint
Simulating cyber defense
Previous slide
Next slide
Back to first slide
View graphic version