2.5 Deception and Disruption Flashcards

(8 cards)

1
Q

What are honeytraps?

A

These are deception techniques that allow security defenders to understand attacker behaviour patterns. They all intend to look legitimate to attract attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different types of honey traps?

A

Honeypots, honey nets, honey files, honey tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a honeypot?

A

A decoy system E.g. webserver

High-interaction - Is running the application or providing services
Low-interaction - Not running the application or providing services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a honeynet?

A

Is multiple, linked honeypots that simulate a network environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a honeyfile?

A

A decoy file located on a network. It is designed to detect access and exfiltration attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a honey token?

A

A beacon embedded into a document, databases, images, directory and folders

It is used to identify the attacker -> it can track malicious actors and reveal informarion about their identity and methods they used to exploit a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are spam traps?

A

Fake email address used to identify and block spammers. Real mail is unlikely to be sent to a fake address, when an emai is received it is most likely spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a DNA sinkhole?

A

A DNS server that responds with false results. It is used to redirect malicious internet traffic so that it can be captured and analysed by security analysts

Sinkholes are used to seize control of botnets by interrupting the DNS names of the botnet that is used by malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly