Intrusion detection with honeypot keys
A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the...
Saved in:
Main Authors | , , , , |
---|---|
Format | Patent |
Language | English |
Published |
01.08.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A honeypot file is cryptographically secured with a cryptographic key. The key, or related key material, is then placed on a central keystore and the file is placed on a data store within the enterprise network. Unauthorized access to the honeypot file can then be detecting by monitoring use of the associated key material, which usefully facilitates detection of file access at any time when, and from any location where, cryptographic access to the file is initiated. |
---|---|
Bibliography: | Application Number: US202117370863 |