Data Poisoning, Bait and Decoys
- • Poisoned data makes compromise of the real data more expensive.
- • Bait is false data whose usage can be tracked, allowing administrators to detect and "watch" abusers.
- • Decoy data disguises real information
Examples
- • Artificial user data that includes genuine contact information that is monitored. (good for employee and paper leaks)
- • Artificial user data that triggers warning systems if accessed.
- • Disguise the data entry requested by a user by mixing it with non-requested data.
- • Generate additional entries in systems where the cost of compromise is relatively low. (Same data, modify keys)