By Mike S
I like his ideas, but I imagine they will be tricky to implement. It is difficult enough to create secure web apps, much less honey-pot enabled web-apps.
Cyber attackers have long embraced deception by deploying tactics, such as social engineering help-desk employees to install trojans or obtain users’ credentials. Even the famed hacker, Kevin Mitnick, wrote a book called “The Art of Deception.” If deception can be used to attack, can it also be used in cyber defense?
counter-techniques , honeypot , SC Magazine