Fidelis Deception Module

Data Sheet

Summary

Cybercriminals seek passwords and credentials to enter networks and applications in order to monitor and steal data. Capture the flag exercises highlight how human attackers analyze email, files, documents, and unstructured data for credentials, while automated malware mainly focuses on structured data in web browsers and apps. Passwords are a top priority for attackers to successfully enter and move within networks. Each successful step helps an attacker stay quiet, preventing digital “noise” that might otherwise give them away. Knowing what attackers desire creates an opportunity for an active defense; to lure, detect, and defend.

Download