Deception and Disruption 1.2 Flashcards
1
Q
Describe the use of a HONEYPOTS.
A
- Attracts the bad guys and traps them.
- Create a virtual world to explore.
- Creates a constant battle to discern which is a fake system and which is real.
2
Q
Describe the application of HONEYNETS.
A
- A large deception network with one or more HONEYPOTS.
- This fake network is comprised of servers, workstations, routers, switches, and firewalls.
3
Q
Describe the use of HONEYFILES in addressing attackers to a system?
A
- Honeyfiles are fake files to further convince attackers the legitimacy of a system.
- When attackers attempt to access these files, an alert is sent out.
- These files should not be accessed by anyone within your organization.
4
Q
How are HONEY TOKENS used in addressing attackers?
A
- Tracks malicious actors using traceable data which include traceable API credentials or fake email addresses.
- Allows for tracking use on the internet.
5
Q
What are examples of HONEY TOKENS?
A
- Database records, browser cookies, and web page pixels.