How to Deceive Cyber-Attackers With a Kill Chain

By Karen A. Frenkel  |  Posted 09-22-2015 Email

Imagine that you could lie to the cyber-attacker on the other end of the command-and-control console, or fool malware at the affected endpoint, or both. Deception as a defense against attackers is an attractive strategy for enterprises, according to a new Gartner study. Deception technologies use feints to thwart attackers' cognitive processes, disrupt their automation tools, delay their activities or prevent the progression of a breach, the study explains. The report says automated tools to do that represent a "sea change" in the future of IT security. A subset of those tools disrupts decoy sensors that enhance attack detection across an enterprise's internal environment by mimicking endpoint services, applications and systems. "The traditional defense-in-depth approach to network security simply isn't working," said Carl Wright, executive vice president and general manager of TrapX Security, a deception-based cyber-security firm. "Deception technology can change the fundamental economics of cyber-defense, shifting costs from defender to attacker while denying freedom of movement on the network." Here are deceptions along a kill chain that create an electronic "hall of mirrors" to divert attackers from sensitive assets.

Karen A. Frenkel writes about technology and innovation and lives in New York City.


Submit a Comment

Loading Comments...
Manage your Newsletters: Login Register