Visible to the public What is Deception Technology?Conflict Detection Enabled

TitleWhat is Deception Technology?
Publication TypeMagazine Article
Year of Publication2017
MagazineForce Point
EditionDeception Technology
KeywordsCognitive Security, Cognitive Security in Cyber, deception, Deception Technology
Abstract

Deception technology involves the generation of traps or deception decoys. The use of deception technology can help fool hackers into thinking that they have gained access to assets such as workstations, servers, applications, and more, in a real environment. Security teams can observe and monitor the operations, navigation, and tools of the hackers without the concern that any damage will occur on real assets. It is possible to detect breaches early, reduce false positives, and more, using deception technology.

URLhttps://www.forcepoint.com/cyber-edu/deception-technology
Citation Keynode-62628