Chapter 12. Traps and Deceptive Measures

For years, information security professionals and others have been attempting to fight computer crime and misuse. Few would disagree that despite the emergence of new standards and technology (including better intrusion detection technology, sophisticated third-party authentication methods, advanced encryption algorithms, improved procedures, more types of professional certification, and other new approaches and developments), computer crime and misuse are actually becoming worse.Why?

Many potential explanations exist; one particularly plausible one is that security professionals’ approaches almost invariably ...

Get Incident Response: A Strategic Guide to Handling System and Network Security Breaches now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.