Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

PDF

Edith Cowan University

2006

Deception

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Considerations On Deception Techniques Used In Political And Product Marketing, Carlo Kopp Apr 2006

Considerations On Deception Techniques Used In Political And Product Marketing, Carlo Kopp

Australian Information Warfare and Security Conference

This paper explores three deception techniques which are widely used in political and product marketing. These techniques are ‘deception by omission’, ‘deception by saturation’ and the use of ‘deception by spin’. These techniques are newly analysed in the framework of the four canonical strategies of Information Warfare and Shannon’s capacity and entropy theorems, and their respective strengths and weaknesses established. Specific strategies for the defeat of these deception techniques are discussed.


Deception On The Network: Thinking Differently About Covert Channels, Maarten Van Horenbeeck Apr 2006

Deception On The Network: Thinking Differently About Covert Channels, Maarten Van Horenbeeck

Australian Information Warfare and Security Conference

The concept of covert channels has been visited frequently by academia in a quest to analyse their occurrence and prevention in trusted systems. This has lead to a wide variety of approaches being developed to prevent and identify such channels and implement applicable countermeasures. However, little of this research has actually trickled down into the field of operational security management and risk analysis. Quite recently a number of covert channels and enabling tools have appeared that did have a significant impact on the operational security of organizations. This paper identifies a number of those channels and shows the relative ease …