Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
Considerations On Deception Techniques Used In Political And Product Marketing, Carlo Kopp
Considerations On Deception Techniques Used In Political And Product Marketing, Carlo Kopp
Australian Information Warfare and Security Conference
This paper explores three deception techniques which are widely used in political and product marketing. These techniques are ‘deception by omission’, ‘deception by saturation’ and the use of ‘deception by spin’. These techniques are newly analysed in the framework of the four canonical strategies of Information Warfare and Shannon’s capacity and entropy theorems, and their respective strengths and weaknesses established. Specific strategies for the defeat of these deception techniques are discussed.
Deception On The Network: Thinking Differently About Covert Channels, Maarten Van Horenbeeck
Deception On The Network: Thinking Differently About Covert Channels, Maarten Van Horenbeeck
Australian Information Warfare and Security Conference
The concept of covert channels has been visited frequently by academia in a quest to analyse their occurrence and prevention in trusted systems. This has lead to a wide variety of approaches being developed to prevent and identify such channels and implement applicable countermeasures. However, little of this research has actually trickled down into the field of operational security management and risk analysis. Quite recently a number of covert channels and enabling tools have appeared that did have a significant impact on the operational security of organizations. This paper identifies a number of those channels and shows the relative ease …