Spoofing the Spoofers
Essentially, the software enables a security professional or system administrator to study and react to, hacker activity with much greater sophistication…
Spoofing the Spoofers Read MoreCyberSecurity Deception Software tricks hackers into revealing the tactics they use to penetrate and control computer systems. Instead of blocking hackers, the software ingeniously invites hackers in, routes them to a decoy Web site or network, and then studies their behavior as they reveal their nefarious methods.
Approaches to the security deception method vary, but the principle behind them remains the same: enable a hacker to penetrate your network, then trick him or her into thinking they are working with your actual network or data when in fact they are really working with a dummy network or dummy data.
Often, security deception software creates emulations of the inner workings of entire networks or Web sites in an attempt to fool hackers.
—CACM, “Spoofing the Spoofers”
Essentially, the software enables a security professional or system administrator to study and react to, hacker activity with much greater sophistication…
Spoofing the Spoofers Read More