Spotting the curious
Create fictitious connections to a real machine
Use a ‘trap’ account
Watch and log on the legitimate machine for anyone attempting to log on with the ‘trap’ account
Previous slide
Back to first slide
View graphic version