Home Did you know ? Decoy Techniques

Decoy Techniques

by Unallocated Author

Hackers are not the only ones that are using tricks to hack into systems, security administrators have also learned sleight-of-hand tricks and use them to attract hackers into a sense of false security. After they’ve had the opportunity to detect hackers and trace their actions back to the origin, they send law enforcement or other officials to swoop in and prevent the malicious activity.

Honey Pots
Administrators usually create honeypot systems that seem to be very profitable hacker targets. honeypots may include files that seem to be sensitive and/or valuable or run false services (like a web server) that seem to be critical to an organization’s operations. In fact, these systems are set up to attract hackers away from truly critical resources and enable administrators to watch and trace their actions.

Pseudo-Flaws
Pseudo-flaws are fake vulnerabilities or possible loopholes intentionally embedded into a system in a try to detect hackers. They are usually used on honeypot systems and on critical resources to emulate the popular operating system vulnerabilities. Hackers trying to exploit a known vulnerability might stumble across a pseudo-flaw and think that they have successfully penetrated a system.

You may also like