Use CaseInformation Technology
Deploy decoy assets to support activities such as network security management
Deploy decoy-assets in a network as bait for attackers, to identify, track, and disrupt security threats. The aim is to lure attacks in to information traps to allow for an augmented security response.
⚙
Other
Operational - Increased machine uptime
⚙
Other
Risk reduction - Reduce data theft risk
⚙
Other
Risk reduction - Malware reduction