You create a honeypot which is intended to detect unauthorized activity on your network. This closely monitored data appears to contain vulnerable, valuable and useful information, but it is designed as bait for network intrusion detection.
Attach this to an Asset – Server that you have in play. If this Asset – Server is the target of an Attack – Data Breach, you may choose to prevent that attack; if so, discard this Honeypot card.
The CIAS was established at UT San Antonio in June of 2001 as part of UT San Antonio’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.