April 2018
Intermediate to advanced
640 pages
17h 12m
English
This chapter covers the topic of deception for defensive purposes. The chapter first covers deception in conflict from a historical perspective and then moves into the use of deception for protection of information systems using honeypots. The chapter provides many hands-on examples and explores the latest in deception and honeypot technologies.
In this chapter, we cover the following topics:
• Brief history of deception
• Honeypots as a form of deception
• Open source honeypots
• Commercial options
Deception is as old as conflict. In fact, earlier than 800 bce, Sun Tzu, in his book The Art of War, said, “All warfare is based on deception.”1 A notable example ...