Visible to the public What is Deception Technology?Conflict Detection Enabled

TitleWhat is Deception Technology?
Publication TypeMagazine Article
Year of Publication2017
MagazineForce Point
EditionCyber Education
KeywordsCognitive Security, Cognitive Security in Cyber, deception, Deception Technology
Abstract

The aim of deception technology is to prevent a cybercriminal that has managed to infiltrate a network from doing any significant damage. The technology works by generating traps or deception decoys that mimic legitimate technology assets throughout the infrastructure.

URLhttps://www.forcepoint.com/cyber-edu/deception-technology
Citation Keynode-62718