Technique | Decoy |
---|---|
T1-Fake Database | Simulated or real honey database |
T2-Fake Database Tables | Enticing table names with fake records |
T3-Fake Database Records | Fake records in real databases |
T4-Log Manipulation | Fake URL, address, account, and other honeytokens |
TBC | TBC |