Sun Tzu's 13 lessons to combat hackers

Staff Writer
Page 9 of 14  |  Single page

Lure the cybercriminal to learn from his actions

Sun Tzu's 13 lessons to combat hackers

"Rouse him, and learn the principle of his activity or inactivity. Force him to reveal himself, so as to find out his vulnerable spots."

Honeypots are decoy systems that attract attackers so we can watch what they do.  They've been around for 20 years since Clifford Stoll described them in The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage.

In the early internet days (like back when we saw the Apple II operating system viruses spread through pirated computer games at Texas A&M University around 1981), honeypots were valuable ways to learn how networks were breached.  We're still learning but we're struggling to keep up with the cyber weapons used by highly financed, highly organised international cyber gangs

The battle is not over and the intelligence challenge continues. By keeping current on how attackers operate, we can train people and build processes, technology and strategy to counter attacks.

A honeypot traps an attack for analysis.
A honeypot traps an attack for analysis.

 

Previous PageNext Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Log In

  |  Forgot your password?