A SANS Whitepaper – Implementer’s Guide to Deception Technologies
In this paper we focus on how deception technologies can significantly improve an organization’s ability to quickly and accurately detect attackers while collecting sufficient threat intelligence and attack attribution information to improve response effectiveness. The detection of threats on the network is the primary purpose and most mature benefit of cyber deception, though many organizations also leverage deception data for gathering company-centric attack information.
Key Points Covered in the Whitepaper
- Forms of deception Technologies
- How Deception Technologies Reduce Risk
- Understanding Attacker Activities and Leveraging Deception Technologies to Combat Them
- When and How to Implement Deception Technologies