Deceive By Design: How To Protect Critical Infrastructure With Deception Technology

preview_player
Показать описание
Moshe Ben Simon makes the case and provides examples of how deception technologies can be used in OT systems. This can delay the attacker and give the defender more time to detect and respond to the attack before the attacker succeeds. Deception also provides a high fidelity signal since no one should access the deception device or system.

Honeypots have been around for a while, but the deception discussed in this session goes well beyond a high interaction honeypot.
Рекомендации по теме