Business Adaptability Through Deception Technology

This research introduces deception technology, an innovative cybersecurity strategy that involves the creation of deceptive assets within an organization's network. These assets, such as decoy servers and endpoints, closely mimic authentic resources, diverting potential attackers and facilitati...

Full description

Saved in:
Bibliographic Details
Main Authors: Olaniyi Abiodun Ayeni, Adejumo Elizabeth, Ovat Ejibha Victor
Format: Article
Language:English
Published: Naif University Publishing House 2024-12-01
Series:Journal of Information Security and Cybercrimes Research
Subjects:
Online Access:https://journals.nauss.edu.sa/index.php/JISCR/article/view/3060
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This research introduces deception technology, an innovative cybersecurity strategy that involves the creation of deceptive assets within an organization's network. These assets, such as decoy servers and endpoints, closely mimic authentic resources, diverting potential attackers and facilitating crucial threat intelligence gathering. By engaging with adversaries and providing real-time insights, deception technology enables businesses to swiftly adapt to the evolving cyber threat landscape. This paper investigates phasor technology and its mathematical representation, alongside the implementation of FORTINET's FortiDeceptor and its integration into cybersecurity business operations. The objective is to enhance threat detection capabilities, detect insider threats early, and fortify overall security postures by deploying FortiDeceptor, a tool suitable for banking systems. In response to the escalating threat of cyberattacks, proactive measures have been taken to develop more adaptable and responsive cybersecurity protocols.
ISSN:1658-7782
1658-7790