Pillar A: CybersecurityA19

Cyber Deception & Active Defense

Honeypots, honeytokens, canary tokens, deception platforms, moving target defense, MITRE D3FEND, adversary engagement.

Part of Pillar A: Cybersecurity · Cybersecurity groups the disciplines that share methods, tools, and threat models with Cyber Deception & Active Defense.

What is Cyber Deception & Active Defense?

Cyber deception flips the asymmetry of cybersecurity — instead of defenders needing to be right every time, deception creates an environment where any attacker interaction with fake assets is a guaranteed true positive alert. Honeypots, honeytokens, canary tokens, and deception platforms deploy convincing fake credentials, files, services, and systems that legitimate users never touch.

The MITRE D3FEND framework formalizes deception as a defensive technique, and modern deception platforms like Thinkst Canary have made deployment accessible to organizations of any size. A single canary token in an AWS credential file, a fake admin account in Active Directory, or a decoy database server can detect lateral movement that bypasses every other security control.

Moving target defense takes deception further by dynamically changing the attack surface — shuffling IP addresses, randomizing ports, and diversifying software stacks so that reconnaissance becomes unreliable and exploits become fragile.

Why it matters

Traditional detection has a false positive problem. Deception has a zero false positive advantage — if anyone touches a honeypot, it's malicious by definition. This makes deception the highest-signal detection source in any security stack.

Cyber deception complements detection engineering and threat hunting by creating tripwires that catch attackers who evade signature-based and behavioral detection. It's particularly effective against insider threats and post-compromise lateral movement.

Standards and frameworks

Curated resources

Authoritative sources we ground Cyber Deception & Active Defense questions in — frameworks, research, guides, and tools.

Certifications that signal this domain

Credentials whose blueprint meaningfully covers this domain. Core means centrally covered; also touched means present in the blueprint but not the primary focus.

Core coverage

GDATExpert·GIACOfficial page →

GIAC Defending Advanced Threats

GIAC Defending Advanced Threats

Browse all certifications → — pick a cert on the interactive map to highlight every domain it covers.

Education and certifications

More in Cybersecurity

Test what you know about Cyber Deception & Active Defense

109 questions available. Beginner to expert questions, scored against the global leaderboard.