(1)Defense Through Deception Flashcards

1
Q

What are honeypots?

A

Honeypots are computers that are supposed to look really attractive to threat actors by containing vulnerabilities or services that typically are used by systems that have sensitive data on them, so like a fishing lure, they are made to entice attackers to go after them.

The thing is though, they aren’t legit systems and instead have fake data on them or aren’t actually used in the corporate network to conduct real business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are honeypots used for?

A

Honeypots are used to help analysts conduct research on an attackers methods and to see what type of data or systems the attacker is trying to get hold of.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are DNS sinkholes?

A

DNS sinkholes provide fake info to the bad software that that is working through an org’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do DNS sinkholes do specifically?

A

Specifically, DNS sinkholes detect suspicious activity and instead of providing the information that it is asking for (such as information about a Command and Control (C&C) server, it provides the IP address of a sinkhole that is designed to stop botnet infected systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly