Our poster “The Case of Using Negative (Deceiving) Information in Data Protection” won the best poster award during the 15th Annual Information Security Symposium held at Purdue University.
In this poster we present a novel taxonomy of methods and techniques that can be used to protect digital information grouped into four categories. We map these protection techniques against the cyber kill-chain model and discuss some findings. Moreover, we identify the use of deceit as a useful protection technique that can significantly enhance the security of computer systems.[Publication Web Page]