A Decoy Environment comprises hosts and networks for the purposes of deceiving an attacker.Synonyms: Honeypot .
Systems in a decoy environment are typically configured so that some detectable means of communication does not have any legitimate business purpose. Any communication via these means should be logged and analyzed to find potential indicators of compromise for a possible past or future attack against other systems.
There are 4 techniques in this category, Decoy Environment.
|A Decoy Environment comprises hosts and networks for the purposes of deceiving an attacker.
|- Connected Honeynet
|A decoy service, system, or environment, that is connected to the enterprise network, and simulates or emulates certain functionality to the network, without exposing full access to a production system.
|- Integrated Honeynet
|The practice of setting decoys in a production environment to entice interaction from attackers.
|- Standalone Honeynet
|An environment created for the purpose of attracting attackers and eliciting their behaviors that is not connected to any production enterprise systems.