Biblio
Filters: Author is Linda Musthaler [Clear All Filters]
Virtual environments make it easy to deploy deception technology. Network World.
.
2016. Usage of virtual machines is one of the ways in which cyber deception is enabled. TrapX Security’s DeceptionGrid solution make uses of virtual machines to lure and trap attackers. Within the virtual environment, an attacker’s actions and techniques can be further analyzed and used to defend against them.