Which deception technology involves deploying a decoy system or service that imitates a genuine production asset in order to attract, engage, and monitor attackers?
A honeypot is an intentionally vulnerable, stand-alone system or service that appears legitimate to threat actors. Any interaction with it is automatically suspicious, allowing defenders to record, analyze, and learn from attacker activity without exposing production assets. A honeynet is a larger collection of multiple honeypots that emulates an entire network. A honeyfile is a single decoy document placed to detect unauthorized access, and a honeytoken is a small piece of fake data (such as bogus credentials) embedded in real systems for the same purpose. These alternatives are also forms of deception, but none of them is a single decoy system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a honeypot and how does it work?
Open an interactive chat with Bash
What are the differences between a honeypot and a honeynet?
Open an interactive chat with Bash
What types of data can be collected from interactions with a honeypot?