Deception in cyber security

What is deception in cyber security?
  1. The aim of deception is to preventa cybercriminal that has managed to infiltrate a network from doing any significant damage.
  2. Deception technologies generate decoys and traps that mimic real technology assets throughout a corporate infrastructure.
  3. Once the bait has been taken notifications are broadcast to a centralised deception server that records the behaviour, techniques and methods used.
  4. Traditionally individuals think of “honeypots” or “honeynets.
Benefits of deception in cyber security
Deception technologies and strategies can help to:
  1. Monitor and record attacker behaviour in real time.
  2. Improve incident response.•Reduce false positives.
  3. Automateand scale.
  4. Provide detailed and accurate reporting to authorities
Challenges of deception in cyber security
  1. Organisations need to develop deception strategies that are dynamic, indistinguishable and fresh.
  2. Deception is easy to do, but hard to do well.
  3. Attackers sometimes see deception as a challenge or an opportunity to show off their skillsets.
  4. It might not be right for everyone. Source

iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey. Contact Us for more information.