Access Control Lists (ACLs) + Deception and Disruption Technology

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/4

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

5 Terms

1
New cards

Access control lists (ACLs)

are rules that either permit or deny actions

2
New cards

Honeypots

are systems that are intentionally configured to appear to be vulnerable but that are actually heavily instrumented and monitored systems that will document everything an attacker does while retaining copies of every file and command they use

3
New cards

Honeynets

are networks set up and instrumented to collect information about network attacks. In essence, a honeynet is a group of honeypots set up to be even more convincing and to provide greater detail on attacker tools due to the variety of systems and techniques required to make it through the network of systems

4
New cards

Unlike honeynets and honeypots, which are used for adversarial research, honeyfiles

are used for intrusion detection. A ____ is an intentionally attractive file that contains unique, detectable datable that is left in an area that an attacker is likely to visit if they succeed in their attacks

5
New cards

Honeytokens

are data that is intended to be attractive to attackers but which is used specifically to allow security professionals to track data