Businesses set up fake systems, data, and devices that mimic real ones within the network. These are often referred to as decoys.
Examples include fake files, credentials, or devices such as printers, servers, and IoT devices. These fake systems are made to look vulnerable and attract attackers. When an attacker interacts with them, an alert is triggered, revealing their position and intentions.
Additionally, businesses use breadcrumbs in their deception systems. Breadcrumbs are fake clues—such as files, fake login credentials, or documents—that guide attackers toward the decoys, luring them into engaging with the deceptive resources.