Data Photo by Markus Spiske on Unsplash |
Holding a PhD from Florida Atlantic University in computer engineering, Dr. Jie Wu serves as a professor at Temple University. Dr. Jie Wu recently represented Temple University at DependSys 2019 in Guangzhou, China, where he gave a keynote address.
Mr. Wu’s presentation at DependSys was titled “Cyber Security Defense: From Moving Target Defense to Cyber Deception.” Cyber deception refers to a recent and innovative form of cyber security defense that allows an organization to detect cyber attacks while at the same time observing and learning about the attacker and the attacker’s targets.
Cyber deception functions through a deception system that resembles actual network assets. This system effectively creates a decoy that attracts cyber attacks. The process to set up a deception system involves a discovery phase where an organization determines what they want to protect, followed by development and distribution of decoys and breadcrumbs that mirror network resources that might attract an attack. Following these phases, the organization actively adapts and monitors the deception system in order to detect attacks and learn from them.
Mr. Wu’s presentation at DependSys was titled “Cyber Security Defense: From Moving Target Defense to Cyber Deception.” Cyber deception refers to a recent and innovative form of cyber security defense that allows an organization to detect cyber attacks while at the same time observing and learning about the attacker and the attacker’s targets.
Cyber deception functions through a deception system that resembles actual network assets. This system effectively creates a decoy that attracts cyber attacks. The process to set up a deception system involves a discovery phase where an organization determines what they want to protect, followed by development and distribution of decoys and breadcrumbs that mirror network resources that might attract an attack. Following these phases, the organization actively adapts and monitors the deception system in order to detect attacks and learn from them.