Placing a false (decoy) text file in a sensitive location (such as /docs/salaries) is an example of a honeytoken or deception technique. This technique is used to attract insider attackers and monitor their actions when they attempt to access the file.
[Reference:, CompTIA Security+ SY0-701 Official Study Guide, Domain 1.1: "Honeytokens are decoy files or records placed in locations of interest to attract and detect insider threats.", Exam Objectives 1.1: “Explain the importance of security concepts in an enterprise environment.”, , , ]
Submit