Cyber Deception is a process of deceiving an attacker using a custom-made cyber trap.
-A trap is a system or software that creates a virtual system that is placed along the network path with the purpose of being hacked.
-Hacking can come in the form of different attacks (viruses, worms, Trojans, etc.), unauthorised probes (to gather sensitive system and network information) or compromises (breaking in and gaining control of data, applications, systems, the network or more).
-The object is to let the attacker use his or her tools to breach the system’s security and search around for important data and applications to exploit (steal, destroy, take control of, etc.).
-While the intruder is invading the system, their every move is recorded and the watchful eyes will monitor what they are actively doing to analyse to data collected after the crime is committed to learn the hacker’s techniques and patterns.
-The information is then learned to be used to fortify the systems and networks being attacked against new attempts to be exploited by the monster.