SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Breach Detection at Scale with AWS Honey Tokens

1 min read
in Document, Paper

WHAT IS A HONEYTOKEN?

We’re using ‘honey token’ in this paper as a stand-in for anything you can lock down and fire alerts from. This can be nearly anything, depending on your context and capabilities: In a database, a record that won’t get returned in normal business queries, but will get returned by an unwary attacker running, can be a honey token, as long as you alert if that record is ever queried. If you control a DNS server, you can set up alarms on certain subdomains being resolved, and sprinkle links to them in your documentation, where your employees will never see it but a curious interloper will spider it. Alternatively you might put some bogus internal email addresses in your CMS and if they ever start getting spam, you know someone’s been peeking at your stuff. All of these are relatively easy to create for one-off or low-scale deployments, and you should consider doing so (or using a freely-available third-party service to do it for you).

GET DOCUMENT

Related

Tags: Active Defense DocumentsBreach Detection at Scale with AWS Honey TokensPaper
4
VIEWS
ADVERTISEMENT

Related Posts

Software Quality Assurance

Software Quality Assurance

June 24, 2022
7 tips to improve your QA

7 tips to improve your QA

June 24, 2022
World Quality Report 2021 22

World Quality Report 2021 22

June 24, 2022
ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness

ARIMA Supplemented Security Metrics for Quality Assurance and Situational Awareness

June 24, 2022

More Articles

Incidents

State Bar of Georgia reels from cyber-attack

May 4, 2022

RATs (Remote Access Trojans)

January 17, 2021

Automate the Boring Stuff with Python

October 26, 2020
Book

Business Continuity Management: Global Best Practices, 4th Edition

November 26, 2021

Meanwhile in Security – Podcast

April 4, 2022
Quotes

“All computer users should treat any…”

October 17, 2020

Shoulder Surfing or Hovering

January 3, 2021

WireShark

September 29, 2020
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....