Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.

Honeytoken | Training Camp
Global Accelerated Learning • Est. 1999
Glossary Term Honeytoken

Training Camp • Cybersecurity Glossary

What is Honeytoken?

Decoy resource for detecting intrusions

Glossary > Honeytoken

Understanding Honeytoken

Honeytoken is a decoy data or resource designed to attract attackers It is used to detect unauthorized access and divert threats away from valuable assets

Learn More About Honeytoken:

Ready to Get Certified?

Turn knowledge into credentials. Browse our instructor-led cybersecurity courses.

View All Courses →