Главная
Study mode:
on
1
Intro
2
What is Deception?
3
All Rainbows and Unicorns?
4
Before You Begin...
5
Gimme Some Examples
6
Foreign Device on Network
7
Compromised Trusted System
8
Messing With the Internet
9
MOAR DECEPTION
10
For Example...
11
Honey Badger Don't Give A...
12
Deceptive Metadata
13
Spear-phishing / Credential Theft
14
The Cat and Mouse Game Continues
15
Questions?
Description:
Explore early detection techniques through deception in cybersecurity with Jason Nester's 57-minute conference talk from BSides Cleveland 2019. Delve into the concept of deception, its advantages and challenges, and practical implementation strategies. Learn about various deceptive scenarios, including foreign devices on networks, compromised trusted systems, and internet manipulation. Discover advanced deception tactics like honey badger systems, deceptive metadata, and countering spear-phishing attempts. Gain insights into the ongoing cat-and-mouse game between attackers and defenders, and participate in a Q&A session to further enhance your understanding of this critical cybersecurity approach.

Early Detection through Deception

Add to list