Deception technology - Definition from the Hotspot Shield Glossary

This kind of technology is still in development but is emerging as an important counter to online attacks. The technology is usually fully automated requiring no human input and attempts to detect threats, analyze them, and then provide defense and counter measures for protection.

Deception technology builds upon traditional methods of cyber defense and attempts to take into account or perceive the human attackers actions and point of view to better understand the attack and how to combat it. The deceptive part of Deception Technologies usually involves setting traps, decoys or lures for attackers - This could be a system that is purposefully easy to attack, or a block of information that can easily be stolen - When an attacker enters this system or attempts to steal the information, they might trigger a trap or cause their own devices and connections to be scanned in reverse.