skip to main content

Introduction

Most organizations accept that the malicious penetration of their networks by human attackers and/or automated malware is inevitable.

Highlights

  • Activity associated with decoys, which are of no interest to genuine users, can be assumed to be malicious, so there should be no false positives.

Features and Benefits

  • Describes how deception technology works.
  • Explains the different approaches to deception.

Key questions answered

  • What is a low-interaction decoy?
  • Does deception tech help with detection?

Table of contents

Ovum view

  • The use of deception to fool attackers in cyberspace
  • The inevitability of cyberattacks
  • The value of deception technology
  • The emerging market for deception

Appendix

  • Further reading
  • Author