A defence in depth approach in cybersecurity systems but the deception

A defence in depth approach in cybersecurity systems

This preview shows page 7 - 10 out of 16 pages.

A defence in-depth approach in cybersecurity systems but the deception technology use helps in reducing the risk in each effective protection layers and merges with a compound mix of defensive and offensive measures to acquire the maximum protection on breaches. The above process can be satisfied by a mix of applications and data deception this is done to identify and direct the conflict out of the system. According to research deception program provides the energy sector with the required tools to maintain an active protection wall. also, it provides firm support on the in-network threats detection and maintains highly responsive abilities. The deception platform provides a view of early detection. Alerts and makes to emancipate these abilities in all the Energy sector to maintain and protect the confidential information. The relevance of deception in the energy sector Deception technology is used to prevent a cybercriminal that has managed to prevent a network from doing any further damage. It operates
Image of page 7
by penetrating traps or decoys. Deception technology is used in various ways; Early post-breach detection- this part explains that the deception technology helps by providing attackers with a false sense of security and making them believe they have managed to hack your networks. So, it will be easier to monitor their steps as long as they don't destroy the company's decoy system. The information recorded about the attackers will later be used to secure the network against any possible attacks. Reduce false positives and risk- Deceptive technology has no risk to data operations when an attacker attempts to tamper with part of the deception layer an accurate alert is generated which notifies admins that they need to act immediately Solms & Niekerk (2013) states that deception is the integration of deception techniques into security tools and automation. The idea is meant to attract intruders' away from real trap and assets. The technology can easily misdirect the attacker early in the infiltration process. The deception technology helps to reduce the damage caused and helps gain an opportunity to learn from the attacker's methods and behaviours while they are distracted. An example of deception technology is the classic honeypot- this is a planted store of data which contains information that is designed to
Image of page 8
be appealing to attackers. Examples are decoy password lists, false databases and fake access to other regions. Another way where deception technology works is when an intruder enters a network, and they are led by a trail of breadcrumbs straight to the honeypot. The breadcrumbs are triggered to alert security and distract the intruder by feeding them engineered information. Initially this all idea was handcrafted and manually deployed and monitored. But nowadays with the advancement in technology monitoring is fully automated and decoys are generated based on scans of true network area and data. This process is the best for energy company
Image of page 9
Image of page 10

You've reached the end of your free preview.

Want to read all 16 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture