Hva er honeytoken?
A honeytoken(pot) is a type of digital decoy used in cybersecurity to detect unauthorized access to systems or data. It consists of fake data that appears valuable to an attacker but is actually useless to them.
When an attacker interacts with a honeytoken, an alert is triggered, informing the security team that someone is attempting to access sensitive areas.
Honeytokens can take the form of fake login credentials, documents, or API keys. They help identify attackers and understand their methods, serving as an early warning system against cyberattacks.
Sicra and honeytoken
The use of honeytokens is relatively common in cybersecurity. Both Microsoft and F5 discuss the use of honeytokens/pots as a means to detect intrusions.
Read Deceptive defense: best practices for identity based honeytokens in Microsoft Defender for Identity | Microsoft Community Hub at Microsoft.
Read F5 Friday: You’ll Catch More Bees with Honey(pots) | DevCentral at F5.
Services:
Read about what we offer from "Microsoft" here >
Related words: Fake data, Decoys, Cybersecurity, Intrusion detection