The deceive tactic is used to advertise, entice, and allow potential attackers access to an observed or controlled environment.

Informational References


ID Name Description
D3-DE Decoy Environment
D3-CHN Connected Honeynet
D3-IHN Integrated Honeynet
D3-SHN Standalone Honeynet
D3-DO Decoy Object
D3-DF Decoy File
D3-DNR Decoy Network Resource
D3-DP Decoy Persona
D3-DPR Decoy Public Release
D3-DST Decoy Session Token
D3-DUC Decoy User Credential