Deception and Disruption 1.2 Flashcards

1
Q

Describe the use of a HONEYPOTS.

A
  • Attracts the bad guys and traps them.
  • Create a virtual world to explore.
  • Creates a constant battle to discern which is a fake system and which is real.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the application of HONEYNETS.

A
  • A large deception network with one or more HONEYPOTS.
  • This fake network is comprised of servers, workstations, routers, switches, and firewalls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the use of HONEYFILES in addressing attackers to a system?

A
  • Honeyfiles are fake files to further convince attackers the legitimacy of a system.
  • When attackers attempt to access these files, an alert is sent out.
  • These files should not be accessed by anyone within your organization.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How are HONEY TOKENS used in addressing attackers?

A
  • Tracks malicious actors using traceable data which include traceable API credentials or fake email addresses.
  • Allows for tracking use on the internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of HONEY TOKENS?

A
  • Database records, browser cookies, and web page pixels.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly