Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- Thesis Defense Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication Planning and Integrating Deception into Computer Security Defenses