From the course: CompTIA Security+ (SY0-701) Cert Prep: 1 General Security Concepts

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Deception technologies

Deception technologies

Cybersecurity analysts play a cat and mouse game with attackers seeking to prevent them from gaining unauthorized access to a network. Deception technologies can be powerful tools in this battle, allowing analysts to get one step ahead of the attackers. Let's take a look at a few common deception technologies. Analysts use a wide variety of security monitoring systems to detect unauthorized activities on networks, systems, and applications. However, it can often be difficult to tell the difference between legitimate traffic and activity that's part of an attack. Darknets are designed to assist with making this distinction. Administrators set aside portions of their normal IP address space for use as a darknet. No legitimate systems use those addresses. So, therefore, if a monitoring system detects any activity headed to those addresses, it's very likely that it's an attacker performing network reconnaissance. Activity to a darknet warrants further investigation. Honeytokens are fake…

Contents