Esc
Deceive
Definition
The deceive tactic is used to advertise, entice, and allow potential attackers access to an observed or controlled environment.
Techniques
There are 11 techniques in this category, Deceive.
Name | ID | Definition | Synonyms |
---|---|---|---|
Decoy Environment | D3-DE | A Decoy Environment comprises hosts and networks for the purposes of deceiving an attacker. | Honeypot |
- Standalone Honeynet | D3-SHN | An environment created for the purpose of attracting attackers and eliciting their behaviors that is not connected to any production enterprise systems. | |
- Connected Honeynet | D3-CHN | A decoy service, system, or environment, that is connected to the enterprise network, and simulates or emulates certain functionality to the network, without exposing full access to a production system. | |
- Integrated Honeynet | D3-IHN | The practice of setting decoys in a production environment to entice interaction from attackers. | |
Decoy Object | D3-DO | A Decoy Object is created and deployed for the purposes of deceiving attackers. | Lure |
- Decoy File | D3-DF | A file created for the purposes of deceiving an adversary. | |
- Decoy Network Resource | D3-DNR | Deploying a network resource for the purposes of deceiving an adversary. | |
- Decoy Persona | D3-DP | Establishing a fake online identity to misdirect, deceive, and or interact with adversaries. | |
- Decoy Public Release | D3-DPR | Issuing publicly released media to deceive adversaries. | |
- Decoy Session Token | D3-DST | An authentication token created for the purposes of deceiving an adversary. | |
- Decoy User Credential | D3-DUC | A Credential created for the purpose of deceiving an adversary. |
D3FEND™
A knowledge graph of cybersecurity countermeasures