Deception and Disruption 1.2 Flashcards

1
Q

A […] attracts attackers and allows you to see what an attacker is using against you

A

Honey Pot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A […] combines multiple honey pots to create an infrastructure that looks real to the attacker

A

Honey net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A […] is a file with fake information / appears to be important, and is bait for the honey net. An alert is sent if the file is accessed
- “passwords.txt”

A

Honey file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A […] allows you to track the attacker with traceable data

Ex: If data is stolen and posted, you know where it came from. (Fake email addresses, browser cookies, database records)

A

Honey Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly