Business Adaptability Through Deception Technology
This research introduces deception technology, an innovative cybersecurity strategy that involves the creation of deceptive assets within an organization's network. These assets, such as decoy servers and endpoints, closely mimic authentic resources, diverting potential attackers and facilitati...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Naif University Publishing House
2024-12-01
|
| Series: | Journal of Information Security and Cybercrimes Research |
| Subjects: | |
| Online Access: | https://journals.nauss.edu.sa/index.php/JISCR/article/view/3060 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | This research introduces deception technology, an innovative cybersecurity strategy that involves the creation of deceptive assets within an organization's network. These assets, such as decoy servers and endpoints, closely mimic authentic resources, diverting potential attackers and facilitating crucial threat intelligence gathering. By engaging with adversaries and providing real-time insights, deception technology enables businesses to swiftly adapt to the evolving cyber threat landscape. This paper investigates phasor technology and its mathematical representation, alongside the implementation of FORTINET's FortiDeceptor and its integration into cybersecurity business operations. The objective is to enhance threat detection capabilities, detect insider threats early, and fortify overall security postures by deploying FortiDeceptor, a tool suitable for banking systems. In response to the escalating threat of cyberattacks, proactive measures have been taken to develop more adaptable and responsive cybersecurity protocols. |
|---|---|
| ISSN: | 1658-7782 1658-7790 |