Deception and Disruption 1.2 Flashcards
1
Q
A […] attracts attackers and allows you to see what an attacker is using against you
A
Honey Pot
2
Q
A […] combines multiple honey pots to create an infrastructure that looks real to the attacker
A
Honey net
3
Q
A […] is a file with fake information / appears to be important, and is bait for the honey net. An alert is sent if the file is accessed
- “passwords.txt”
A
Honey file
4
Q
A […] allows you to track the attacker with traceable data
Ex: If data is stolen and posted, you know where it came from. (Fake email addresses, browser cookies, database records)
A
Honey Token