Deception and Disruption Technology Flashcards
1
Q
Honeypot
A
Decoy system designed to attract attackers and gather information.
2
Q
Honeynet
A
Network of Honeypots used for monitoring and analysis
3
Q
Honeyfile
A
Fictitious file used to detect unauthorised access.
4
Q
Honeytoken
A
Decoy credential or data item used to detect unauthorised access.