1/4
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Access control lists (ACLs)
are rules that either permit or deny actions
Honeypots
are systems that are intentionally configured to appear to be vulnerable but that are actually heavily instrumented and monitored systems that will document everything an attacker does while retaining copies of every file and command they use
Honeynets
are networks set up and instrumented to collect information about network attacks. In essence, a honeynet is a group of honeypots set up to be even more convincing and to provide greater detail on attacker tools due to the variety of systems and techniques required to make it through the network of systems
Unlike honeynets and honeypots, which are used for adversarial research, honeyfiles
are used for intrusion detection. A ____ is an intentionally attractive file that contains unique, detectable datable that is left in an area that an attacker is likely to visit if they succeed in their attacks
Honeytokens
are data that is intended to be attractive to attackers but which is used specifically to allow security professionals to track data