The Security Deception Dictionary


Canaries Deception Techniques Image


In the ever-evolving landscape of cyber threats, where data breaches and software vulnerabilities make headlines daily, it's crucial for businesses to adopt cutting-edge protective measures. One such innovative approach is cyber deception technology. It's a game-changer for enhancing organizational security and can be a significant relief for your Chief Information Security Officer. This guide is crafted to demystify complex cybersecurity jargon, providing clarity and insight into various terms and concepts.

A-Z of Cyber Deception


Adaptive Defense Strategies

These strategies involve proactive measures against cyber threats, enhancing network security and complicating unauthorized access for cybercriminals.

Alert Overload

When cybersecurity teams are bombarded with too many alerts, leading to potential oversight of critical warnings. Common in environments with continuous monitoring tools.

Application Attack Awareness

Software solutions that help detect and respond to cyber threats swiftly, safeguarding against exploitation of software weaknesses and data breaches.

Self-Governing Deception

Deception technology capable of independently deciding the best course of action to mislead potential intruders.


Beaconing in Cybersecurity

A scenario where malware communicates back to its command center for instructions, often remaining undetected.

Booby-Trapped Systems

Systems configured to alert when an unauthorized user attempts seemingly normal actions, like email operations.



Drawing inspiration from historical canary use in mining, these are digital decoys or sensors designed to mimic network systems, alerting administrators upon unauthorized access attempts.

Counter Cyber Operations

Actions taken to actively defend against and neutralize cyber attacks.


Data Impersonation

This involves mimicking legitimate communication sources to gain unauthorized access to sensitive data or deploy malware.

Deception Cyber Operations Framework

A comprehensive approach covering all aspects of implementing deception technology, from goal setting to execution and monitoring.

Deceptive Cyber Tactics

Proactive cybersecurity measures using decoys and traps that resemble genuine network elements to detect and analyze intruder actions.

Deception Velocity

This term refers to the rapidity and effectiveness of an organization's response to cyber threats.

Decoy Systems

Fake network components designed to attract and mislead cybercriminals, protecting real networks.

Digital Alteration

The practice of modifying digital content or systems for various purposes.

Digital Breadcrumbs

Deception techniques using realistic traps within the network to lure and capture cyber attackers.

Digital Deflection

A tactic to divert attackers from sensitive data, often involving decoys to delay cyber attacks.


Endpoint Illusion Techniques

Deception strategies targeting endpoints like servers, laptops, or mobile devices in a network.

Engagement with Attackers

A strategy involving interaction with potential cyber threats to mitigate or reduce the intended damage.


False Flag Cyber Maneuvers

Operations designed to misattribute the source of an attack to another entity.


Honeypot Varieties

Decoy systems of varying interaction levels (low, medium, high) used to distract and analyze cyber attackers.

Honey Credentials

Fake password setups created to trap unauthorized users.


Imaginary Network Users

Non-existent network users designed to detect and track unauthorized access attempts.


Network Lateral Movement

The progression of a cyber attacker within a network post initial breach, using various tools and techniques.


Mimesis and Data Masking

Techniques involving altering sensitive data to render it useless to attackers, while maintaining its usability for authorized users.

Moving Target Defense

Dynamic cybersecurity strategies that continuously alter network components to prevent successful cyber attacks.


Network Deception Strategies

Deception tactics specifically designed for network security.

Network Transparency

The ability to see and understand all components and data flows within a network.



Similar to data masking, involves making information unclear or unintelligible to unauthorized parties.


Proactive Cyber Defense

Operations targeting cyber threats head-on to prevent future attacks by introducing uncertainty.

Perimeter Deception Techniques

Deception methods applied at the network's boundary to prevent unauthorized access.

Data Perturbation

The practice of adding noise or disruptions to data, making it difficult for unauthorized access while maintaining its integrity.


Cyber Redirection

Diverting attackers to a false or non-existent part of the network.


Spear Phishing Awareness

Educating about targeted email attacks that appear legitimate to extract sensitive information.

Spoofing Tactics

Broad strategies involving the use of legitimate-looking sources for malicious purposes.


Threat Engagement Dynamics

How individuals or systems respond to potential cyber threats, with a focus on speed and effectiveness.

Traps in Cybersecurity

Another term for decoys, these are mechanisms designed to lure and capture cyber threats.

This guide is an introductory resource, and the field of cybersecurity is continuously evolving. For more detailed insights or specific inquiries, feel free to reach out for specialized advice.