How Deception Technology Can Help You Detect Threats Early
Deploying automated decoys can help protect your network and reduce IT costs.
Deception is a frequently used tactic in both defensive and offensive strategies, from chess to duck hunting, and a tool that many security professionals have been using for years. Initially, when deception was used in network defense, it involved a human carefully interacting with an infiltrator to make them believe that they had achieved access to restricted data and to keep them occupied until the threat could be contained. Today, however, technological advancements have eliminated the need for direct human interaction and have increased the believability of decoys.
What Is Deception Technology?
Deception technology is the integration of deception tactics into security tools and automation, meant to attract intruders away from real assets and trap or detain them in areas modeled after real storage or network areas. By misdirecting the attacker early in the infiltration process, the technology can minimize the damage caused and gain an opportunity to learn from the attacker’s methods and behavior while they are distracted.
The simplest form of deception technology is the classic honeypot: a planted store of data whose contents are designed to be appealing to attackers, such as decoy password lists, false databases, fake access to other regions and more. When an intruder enters a network, they are led by a trail of breadcrumbs straight to the honeypot, which is triggered to alert security and distract the intruder by feeding them engineered information.
In the past, these were handcrafted and manually deployed and monitored. Now, however, the technology has advanced to the point that monitoring can be fully automated and decoys can be generated based on scans of true network areas and data.
Currently, decoys are often deployed as mock networks running on the same infrastructure as the real networks. When an intruder attempts to enter the real network, they are directed to the false network and security is immediately notified. The decoys are never accessed by legitimate users so there are almost no false positives with these techniques and intruders become visible much more quickly than if security had to wait for behavior or malware detection based alerts to be notified.
- Pandemic thriller Utopia on Amazon might be the perfect viewing
- 2021 Jaguar F-Pace refreshed with new styling, luxury and tech
- 2020 Halloween full moon: This year’s spooky spectacle brings a rare twist
- The best minimalist wallet for 2020
- NASA chief calls for prioritizing Venus after surprise find hints at alien life
- YouTube is adding a new Shorts feature to rival TikTok and Instagram Reels
- Paul Rudd, world’s youngest 51-year-old, tells fellow kids to mask up
- Jonathan Majors to join MCU as villain Kang the Conquerer, report says
- TikTok ban won’t prevent employees from being paid, US says in filing