0% found this document useful (0 votes)
117 views16 pages

Deception Technology

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views16 pages

Deception Technology

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Deception Technology

The Art of Recording Cyber Attacks


P r e s e n t e d B y -
Name – Rutuja Babasaheb Salunkhe

Branch – Second Year Information


Technology

PRN No. – 2030331246057

College Name – Dr. Babasaheb Ambedkar


Technological University , Lonere

Under the guidance of –


Prof. Ekta Meshram
CONTENT
 What is Deception Technology?
 Importance of Deception Technology
 Evolution of Deception Technology
 Defining a Honeypot
 Working Principle of Deception Technology
 Applicable Methods of Deception
Technology
 Benefits of Deception Technology
 Conclusion
What is Deception Technology?
Deception technology is a cybersecurity
defense practice that aims to deceive
attackers by distributing a collection of
traps and decoys across a system's
infrastructure to imitate genuine assets. If
an intruder triggers a decoy, then the
server will log and monitor the attack
vectors utilized throughout the duration of
the engagement.
Importance of Deception Technology
As attack vectors become increasingly complex,
organizations need to be able to detect suspicious
activity earlier in the attack chain and respond
accordingly. Deception technology provides
security teams with a number of tactics and
resulting benefits to help:
 Decrease attacker dwell time
on their network.
 Reduce alert fatigue.
 Expedite average time to
detect and remediate
threats.
Evolution of Deception Technology
Defining a Honeypot
The basic concept of honeypots are decoy
systems with desired fake data, isolated and
monitored for activity to divert and detect attackers
with no risk to real data, operations or users.
Traditionally, honeypots were created to bait
attackers with fake credit card data and access
credentials on stand-alone systems to learn who
enters, their methods and what they desire.
Honeypots have evolved to automated deception
technology, which is more dynamic and acts as a
smart-alarm system.
Working Principle of Deception
Technology
The Deception Technology is for
MILDEC or military deception. The
Deception Technology’s working
principle is much simpler to
understand, a false decoy network will
run on-existing infrastructure, but not
visible by genuine staff. When any
hacker or intruder visits that
infrastructure they will be able to see
the decoy as an opportunity to hack the
infrastructure and they will fall for
that.
Applicable Methods of Deception Technology

1 . Piggybacking :
2 . Impersonation :
3 . Web-Based Deception :
4 . Hoaxes :
Benefits of Deception Technology
Conclusion
Deception technology, such as those being offered by
Illusive Networks, an Israel based company, has been very
well received by financial institutions, banks, insurance,
and healthcare companies, which rely heavily on keeping
their customer and transactional data safe. This
technology holds promise for the future of cybersecurity,
wherein it is poised to expose bad actors and actual
hackers trying to breach networks actively, and not just
with passive tools like malware and phishing tools. This
new and exciting technology brings about a new
dimension in companies’ cybersecurity arsenals to
protect data and expose actual threats and malicious
actors.

You might also like