🛡️

IT Security: Deception Techniques Overview

May 25, 2025

Lecture Notes: IT Security - Using Deception Techniques

Introduction

  • Importance of preventing unauthorized access to systems.
  • Utilize security knowledge to create deception and disrupt attackers.

Honeypots

  • Definition: A tool to attract attackers and observe their methods.
  • Purpose: Engage attackers to understand their techniques, often automated.
  • Functionality: Virtual environments that imitate real systems but are isolated from production.

Building a Honeypot

  • Can use commercial or open-source software packages.
  • Create non-production virtual worlds to attract attackers.
  • Challenges: Continuous upgrade to beat attackers' ability to recognize honeypots.

Honey Nets

  • Definition: Larger infrastructures composed of multiple honeypots.
  • Components: Workstations, servers, routers, firewalls.
  • Goal: Create realistic environments to engage attackers longer.

Additional Resources

Honey Files

  • Definition: Files with fake or seemingly important information.
  • Examples: Files named password.txt containing false data.
  • Monitoring and Alerts: Alerts if accessed inappropriately in the network.

Honey Tokens

  • Definition: Traceable data added to networks for monitoring leaks.
  • Examples:
    • Fake API credentials on public clouds.
    • Fake email addresses for tracking unauthorized distribution.
  • Application: Any falsified data for tracking, like database records to browser cookies.

Conclusion

  • Honeypots, honey nets, honey files, and honey tokens are tools for deception.
  • Aim to learn about attackers' methods and protect real systems.
  • Continuous improvement and monitoring are critical for effectiveness.