Sun Tzu's 13 lessons to combat hackers

Staff Writer
Follow google news
Page 9 of 14  |  Single page

Lure the cybercriminal to learn from his actions

Sun Tzu's 13 lessons to combat hackers

"Rouse him, and learn the principle of his activity or inactivity. Force him to reveal himself, so as to find out his vulnerable spots."

Honeypots are decoy systems that attract attackers so we can watch what they do.  They've been around for 20 years since Clifford Stoll described them in The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage.

In the early internet days (like back when we saw the Apple II operating system viruses spread through pirated computer games at Texas A&M University around 1981), honeypots were valuable ways to learn how networks were breached.  We're still learning but we're struggling to keep up with the cyber weapons used by highly financed, highly organised international cyber gangs

The battle is not over and the intelligence challenge continues. By keeping current on how attackers operate, we can train people and build processes, technology and strategy to counter attacks.

A honeypot traps an attack for analysis.
A honeypot traps an attack for analysis.

 

Previous PageNext Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Tasmanian gov agencies impacted by cyber attack

Tasmanian gov agencies impacted by cyber attack

Australian chief at US defence contractor L3Harris sold exploits to Russia

Australian chief at US defence contractor L3Harris sold exploits to Russia

Vic gov agencies flying blind on server security, audit finds

Vic gov agencies flying blind on server security, audit finds

Home Affairs streamlines risk vetting for gov tech suppliers

Home Affairs streamlines risk vetting for gov tech suppliers

Log In

  |  Forgot your password?