FUDAMENTALS OF SECURITY Flashcards
OUTSMARTING THREAT ACTORS
LIST THE DIFFERENT METHODS USED TO DECEIVE THREAT ACTORS
HONEYNETS->IT IS A NETWORK OF HONEYPOTS
HONEYPOTS->DECOY SYSTEM OR NETWORK SET TO ATTRACT POTENTIAL ATTACKERS. IT MIMICS A REAL SYSTEM WITH VULNERABILITIES.
HONEYFILES-> IT IS A DECOY FILE PUT IN PLACE TO LURE POTENTIAL ATTACKERS
HONEYTOKENS->IT HAS NO LEGITIMATE VALUE BUT IT IS MONITORED FOR ACCESS USE(FAKE URL, DUMMY DATABASE)
BOGUS DNS ->FAKE DNS
DECOY DIRECTORIES
DYNAMIC PAGE GENERATION->WEBSITES WITH EVER CHANGING CONTENT TO CONFUSE AND SLOW DOWN THREAT ACTORS
PORTS TRIGGERING->SECURITY MECHANISM WHERE SPECIFIC SERVICES AND PORTS ARE CLOSED UNTIL A SPECIFIC OUTBOUND PATTERN IS DETECTED
FAKE TELEMETRY DATA -> IT RESPONDS TO THE ATTACKER SCAN OF OUR NETWORK BY SENDING FAKE TELEMETRY OR NETWORK DATA
DEFINE TTPs
TTP: TACTICS TECHNIQUES AND PROCEDURES USED BY THREAT ACTORS