Episode 70 — Deception and Disruption: Honeypots, Honeynets, Honeyfiles, Honeytokens, and Canary Accounts (4.1)
This episode explains deception technologies that help detect, study, or slow attackers by presenting attractive fake targets or monitored artifacts. A honeypot is a decoy system, while a honeynet is a collection of decoy systems designed to observe attacker behavior. Honeyfiles are fake files placed where unauthorized access would be suspicious, honeytokens are monitored values such as fake credentials or database records, and canary accounts are accounts that should not be used during normal operations. For the exam, students should understand that deception controls are usually detective and sometimes disruptive, helping defenders identify unauthorized activity, generate high-value alerts, and gather information without exposing real assets unnecessarily. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!