Ujule Desai, CSO and Head of security research at ZsCaler, compares spoofing activities to motion detectors. “If I were to draw an analogy, you have wires, locks, and doors to protect your house from the bad guys getting in. But when the bad guys come in, or pretend to be the good guys or are inside, the corresponding sensors that you cleverly place in places in the house that are not easily seen but raise the alarm when someone is in the area where you don’t expect to be.”
Truth is essential to the success of deception
A critical part of deception technology is the creation of goods and other threat actors believe that they are real, at least for a while, lest they succeed completely or completely answer them, which will render the deception work useless. “You’re never going to be able to do it perfectly because you’re always going to leave some kind of weird foundation, a little flag,” Handorf tells CSO.
Finding the right information to detect the most important fraud is very important. Goods that appear to be fake, like a thousand computers that are all designed in the same way, “you’re against the enemy that it’s not a real fake,” said Handorf. “Something about the janitor is really wrong. It’s so much better. In the movies, people come in, and they’re like, ‘wait, there’s something about this room that’s just not right. It’s a very simple, ‘And then, all the cops show up.'”
Source link