Honeypot, token, file and net

A honeytoken can be embedded within a database or other data repositories. If the honeytoken is queried or accessed, it indicates potential unauthorized activity, as the token serves no real purpose other than detection.

Last updated