Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.
Training Camp • Cybersecurity Glossary
Decoy resource for detecting intrusions
Honeytoken Definition: Decoy resource for detecting intrusions
Honeytoken is a decoy data or resource designed to attract attackers It is used to detect unauthorized access and divert threats away from valuable assets
Turn knowledge into credentials. Browse our instructor-led cybersecurity courses.
View All Courses →