Placing a warning sign will avoid facilities being damanged by mistake. But what about the info is misused by threat actor to launch attack?

Sometime, deceptions or decoys are used to understand the behaviors of threat actors so that appropriate counter-measures are effectively developed and applied.

Ultimately, it is then all about judgment. This is from both attacker and defender perspective

  • Whether the accessed resources are traps, or
  • Whether the unusual activities are camouflage covering other malicious intend.

Life becomes harder and harder.

Leave a Reply