Article

Manoj Rai
Manoj Rai 22 February 2016
Categories Technology

Of Honeypots, Decoys And Red Herrings

A Look At Cyber-Threats The number of apps on your phone is directly proportional to how tech-savvy you can be. Ask any millennial and they will “app” a problem for you. Want to find your lost keys? Want to drink more water? There’s an app for everything and more often than not, they make our life productive. However, every app requires your ID and password. While a lot of them pair it with their social networks and gain access, every app still needs an entry point to access your personal information. If you misplace one password, it has a trickle effect of sorts. Most of your apps can be hacked. The identity theft implications are massive and the extent of accessible personal information could prove disastrous for many. Enterprise security is no different.

Organisations face multiple cyber threats by risking sensitive data to hackers. Many cyber-security threat prediction reports say attacks through employee systems and organisations seem to be one of the potential threats in 2016. High-profile attacks on large organisations in recent times have shown that existing solutions may not be enough to stop malicious hackers and evolving threats. Cyber-security vendors are looking at new-age deception technologies, tools that deceive attackers, enable the identification and capture of malware at point of entry, and allow enterprises to regain control of their defences. These solutions seek to mislead hackers by luring them towards fake data.

Honeypots

Honeypots are a fake system that creates dummy network nodes to attract hackers. Honeypots function like rat traps. They offer something that appears attractive to an attacker. It makes him spend his resources and time on gathering the ‘honey’, while the honeypot does an admirable job of drawing his attention away from the actual data it seeks to protect.

Fight The Good Fight

Organisations are now looking for more active defence strategies that not only entice attackers, but also trap them, confound them and track their activity. One such deception technology offers an emulation engine masquerading as a run-of-the mill operating system. The ‘operating system’ contains ‘sensitive’ data that could be attractive to attackers — data labelled ‘credit card info’, for instance. The platform will lure the attacker in by allowing him to ‘hack’ this fake data, and in turn, start gathering information about his movements and the codes that he seeks to modify. This intelligence can then be shared with other security tools, such as intrusion prevention systems, to defend against the attack.

Many start-ups are designing various kinds of intrusion deception software that insert fake server files and URLs into applications. These traps are visible only to hackers and not ordinary users.

An example of such a snare could be trapping hackers probing for random files by granting them access to bogus files that are a dead-end and keep on leading them in circles towards more fake data. Other technologies set up fake IP addresses on web servers that on multiple attempts to hack them, will always present a deception to that user. Yet others set up virtual systems or computers that actually have no data on them, and are indistinguishable from other machines on the network. Repeated intrusion into these make it easy to identify hackers.

Decoys

Decoys are similar to honeypots. This method is used in corporate and enterprise networks to safeguard data.

Many decoys act together to fill the attacker’s so that it becomes difficult for him to differentiate between real and fake targets. Many firms use this method to prevent hacking of medical information in hospitals.

Please login or register to add a comment.

Contribute Now!

Loving our articles? Do you have an insightful post that you want to shout about? Well, you've come to the right place! We are always looking for fresh Doughnuts to be a part of our community.

Popular Articles

See all
Digital Marketing Vs. Traditional Marketing: Which One Is Better?

Digital Marketing Vs. Traditional Marketing: Which One Is Better?

What's the difference between digital marketing and traditional marketing, and why does it matter? The answers may surprise you.

Julie Cave
Julie Cave 14 July 2016
Read more
4 Important Digital Marketing Channels You Should Know About

4 Important Digital Marketing Channels You Should Know About

It goes without saying that a company can't do without digital marketing in today's world.

Digital Doughnut Contributor
Digital Doughnut Contributor 5 November 2014
Read more
If You’re A Social Media Manager, UGC Should Be Your Top Priority

If You’re A Social Media Manager, UGC Should Be Your Top Priority

It’s high time that the marketing world rethinks what an effective social media manager actually does. Hint: it’s not chasing “likes” or showing off their follower counts. Let’s face it: so many brands today totally miss the mark when it comes to their social content. Maybe their posts come off as too “salesy.” Perhaps they’re pushing too hard, leaving their followers behind in an endless trail of “look at me” posts.

Luisana Cartay
Luisana Cartay 11 September 2017
Read more
Customer Journey Mapping: A Real-Life Approach to Your Digital Marketing Strategy

Customer Journey Mapping: A Real-Life Approach to Your Digital Marketing Strategy

As financial services and insurance (FSI) companies strive to deliver the seamless multi-channel customer experience, the traditional marketing model has been radically reimagined. Innovative institutions are showing how cross-functional teams focusing on the customer journey can work to develop a single view of the customer – an approach that can bring tangible rewards. Yet research shows that large institutions still have some way to go in maximising the return on their investment in this area.

Aoife McIlraith
Aoife McIlraith 18 September 2017
Read more
10 Marketing Lessons From Apple [Infographic]

10 Marketing Lessons From Apple [Infographic]

The 10-year-old kid, selling ice cold fresh lemonade on the street corner in your local neighbourhood had it right. He or she may not have realized it but the simple marketing strategy that they accidentally and innocently came up with works perfectly on the people strolling by on their daily walk.

Ellie Summers
Ellie Summers 19 September 2017
Read more