Beyond honeypots: It takes a honeytoken to catch a thief
Source: InfoWorld - Posted by Anthony Pell   
Intrusion Detection Last week I talked about the importance of deploying honeypots to catch malicious hackers and malware. But there's a related tool that's craftier and even easier to deploy: the honeytoken. Honeytokens contain digital data created and monitored solely as indicators of digital theft. They can be real data containing a "marker" -- fake data that simply doesn't exist in the real world, at least within a given enterprise. They can be used to track malicious outsiders or insiders engaging in unauthorized activity. There are many types of honeytokens and many methods of tracking; choose yours based on your specific concerns and threat models.

Read this full article at InfoWorld

Only registered users can write comments.
Please login or register.

Powered by AkoComment!