Slide 140
Slide 140 text
Strategies
โ Tarpit - slow your adversary down, slow-responding code.
โ Honeypot - give them credentials that seem legit, but can be used to trace them.
โ Fake data - share data that looks good to machines, but needs a lot of human effort
to clean up.
โ Swiss cheese defence - one layer is rarely enough.
โ Patience can be a virtue when building a counter-attack.