Technologies used to deceive attackers are commonly called deception technologies or honeypots. A honeypot is a system whose value lies in being attacked. By appearing to be part of a network or system, a honeypot attracts and misdirects attackers away from valuable production systems and data. Deception technologies can be used to detect, deflect, and mitigate attacks.
Deception technology is any technology that is used to mislead or trick an attacker. Deception technologies can take many forms, including honeypots, honeytokens, and honeynets.
A honeypot is a system that is designed to appear to be part of a network or system but is actually isolated from it. Honeypots are used to attract and mislead attackers away from valuable production systems and data.
A honeytoken is a piece of data that appears to be valuable but is actually a trap. Honeytokens are used to detect and track attempts to access sensitive data.
A honeynet is a network of honeypots. Honeynets are used to study attackers’ behavior and to identify new attacks.
Deception technology is a powerful tool for security. When used correctly, it can detect, deflect, and mitigate attacks.