##plugins.themes.bootstrap3.article.main##

Olaniyi Abiodun Ayeni Adejumo Ibitola Elizabeth Ovat Ejibha Victor

Abstract

This research introduces deception technology, an innovative cybersecurity strategy that involves the creation of deceptive assets within an organization's network. These assets, such as decoy servers and endpoints, closely mimic authentic resources, diverting potential attackers and facilitating crucial threat intelligence gathering. By engaging with adversaries and providing real-time insights, deception technology enables businesses to swiftly adapt to the evolving cyber threat landscape. This paper investigates phasor technology and its mathematical representation, alongside the implementation of FORTINET's FortiDeceptor and its integration into cybersecurity business operations. The objective is to enhance threat detection capabilities, detect insider threats early, and fortify overall security postures by deploying FortiDeceptor, a tool suitable for banking systems. In response to the escalating threat of cyberattacks, proactive measures have been taken to develop more adaptable and responsive cybersecurity protocols.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

##plugins.themes.bootstrap3.article.details##

Section
Case Report
Copyright Information

Most read articles by the same author(s)