ELI5: What are Deception Technologies?

It’s like setting up a fake treasure chest in your room. If someone sneaks in and opens it, an alarm goes off — and now you know someone was snooping. Security teams do the same thing with computers: they create fake files, fake passwords, and even fake computers that look real. No normal person would ever touch them, so if anyone does, it means a bad guy is in the system. It’s a clever trap that catches intruders early.

Overview

Deception technologies are security tools and techniques that use decoy systems, files, and credentials to detect, deflect, and analyze attacker behavior. By creating fake targets that appear legitimate, organizations can identify unauthorized activity early, slow down attackers, and gather intelligence about their tactics, techniques, and procedures (TTPs).

Key Concepts

  • Honeypots — decoy systems designed to attract and trap attackers
    • Low-interaction — simulates limited services; easy to deploy, less intelligence gathered
    • High-interaction — fully functional system; riskier but captures detailed attacker behavior
  • Honeynets — networks of honeypots simulating an entire environment
  • Honeyfiles — fake files (e.g., “passwords.xlsx”) placed on systems to trigger alerts when accessed
  • Honeytokens — fake data (credentials, database records, API keys) that alert when used
  • DNS sinkholes — redirect malicious domain requests to a controlled server; disrupts botnet communication and detects infected hosts
  • Fake telemetry — generating false network data to confuse attackers performing reconnaissance
  • Deception platforms — enterprise solutions that automate deployment and management of decoys across the network
  • Benefits:
    • Early detection of lateral movement and insider threats
    • Low false-positive rate — legitimate users have no reason to access decoys
    • Intelligence gathering on attacker methods
    • Slows attackers by wasting their time on fake targets
  • Risks:
    • Maintenance overhead; decoys must appear realistic
    • High-interaction honeypots can be co-opted if not properly isolated

Exam Tips

Remember

Honeypot = decoy system. Honeynet = network of honeypots. Honeyfile = decoy file. Honeytoken = decoy credential/data. DNS sinkhole = redirects malicious DNS to controlled IP. Know the distinctions — the exam tests each term specifically.

Key Advantage

Deception technologies have a very low false-positive rate because legitimate users and processes should never interact with decoy resources. Any interaction is suspicious by definition.

Connections

Practice Questions

Scenario

See case-deception-technologies for a practical DevOps scenario applying these concepts.