Sun Tzu's 13 lessons to combat hackers

Staff Writer
Follow google news
Page 9 of 14  |  Single page

Lure the cybercriminal to learn from his actions

Sun Tzu's 13 lessons to combat hackers

"Rouse him, and learn the principle of his activity or inactivity. Force him to reveal himself, so as to find out his vulnerable spots."

Honeypots are decoy systems that attract attackers so we can watch what they do.  They've been around for 20 years since Clifford Stoll described them in The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage.

In the early internet days (like back when we saw the Apple II operating system viruses spread through pirated computer games at Texas A&M University around 1981), honeypots were valuable ways to learn how networks were breached.  We're still learning but we're struggling to keep up with the cyber weapons used by highly financed, highly organised international cyber gangs

The battle is not over and the intelligence challenge continues. By keeping current on how attackers operate, we can train people and build processes, technology and strategy to counter attacks.

A honeypot traps an attack for analysis.
A honeypot traps an attack for analysis.

 

Previous PageNext Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Telstra used ConnectID impermissibly for months

Telstra used ConnectID impermissibly for months

University of Sydney "online IT code library" breached

University of Sydney "online IT code library" breached

NSW Health clinicians "normalise" bypass of cyber security controls

NSW Health clinicians "normalise" bypass of cyber security controls

UK government was hacked in October, minister confirms

UK government was hacked in October, minister confirms

Log In

  |  Forgot your password?