Honeypot, token, file and net
Last updated
Last updated
A honeytoken can be embedded within a database or other data repositories. If the honeytoken is queried or accessed, it indicates potential unauthorized activity, as the token serves no real purpose other than detection.