Deceptive Defense Examples
Concealment
Concealed services
Hard-to-guess passwords
Low building profile
Path diversity
Retaining confidentiality of security status information
Spread spectrum
Camouflage
Noise injection
Previous slide
Next slide
Back to first slide
View graphic version