• Steve Jones - SSC Editor (5/16/2013)


    Eric M Russell (5/16/2013)


    ...

    There could also be honeypot tables. For example, the DBA could create tables with enticing names like [Employee_Salary] or [Customer_CreditCard] and then place an audit event with email notifications. Even an internal hacker who gains access with a proper account name and password could fall for that one.

    Oohh, I like that. A great idea.

    Taking it another step forward, there could even be honeypot data. For example, a corporation concerned about hackers (or internal employees) stealing confidential financial information could populate tables with bogus revenue, sales projections, or executive salaries.

    Or the banks could post bogus credit card numbers on the web. When someone attempts to make a purchase using one of these account numbers, it would alert local police. Theives may even come to conclusion that databases of "stolen" account numbers are not worth the risk.

    "Do not seek to follow in the footsteps of the wise. Instead, seek what they sought." - Matsuo Basho