Sun Tzu's 13 lessons to combat hackers

Staff Writer
Page 9 of 14  |  Single page

Lure the cybercriminal to learn from his actions

Sun Tzu's 13 lessons to combat hackers

"Rouse him, and learn the principle of his activity or inactivity. Force him to reveal himself, so as to find out his vulnerable spots."

Honeypots are decoy systems that attract attackers so we can watch what they do.  They've been around for 20 years since Clifford Stoll described them in The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage.

In the early internet days (like back when we saw the Apple II operating system viruses spread through pirated computer games at Texas A&M University around 1981), honeypots were valuable ways to learn how networks were breached.  We're still learning but we're struggling to keep up with the cyber weapons used by highly financed, highly organised international cyber gangs

The battle is not over and the intelligence challenge continues. By keeping current on how attackers operate, we can train people and build processes, technology and strategy to counter attacks.

A honeypot traps an attack for analysis.
A honeypot traps an attack for analysis.

 

Previous PageNext Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Phishing attack nets enormous npm supply chain compromise

Phishing attack nets enormous npm supply chain compromise

Service NSW centralises security, networking in mammoth CloudOps overhaul

Service NSW centralises security, networking in mammoth CloudOps overhaul

VicRoads to phase out passwords in favour of passkeys

VicRoads to phase out passwords in favour of passkeys

Apple adds "mercenary spyware" protection to new A19 chip

Apple adds "mercenary spyware" protection to new A19 chip

Log In

  |  Forgot your password?