Main Article Content
The world is rapidly converging and converting a variety of valuable data to its digital equivalent. Its dissemination as eased via the advent of the Internet – has also led to undue attacks/threats due to predictable responses from users. This has evolved the field of social engineering and exploits of user trust-levels. Thus, the use of deception mechanisms now plays a prominent role in enhancing the field of cyber and data security. There exist many techniques to dissuade and/or redirect adversaries via deception mode commonly called honeypots. They seek to detect intrusive activities via services that attract adversaries to it. Honeypots have been successfully used to minimize security breaches. Thus, our study explores deception-based honeypot as an effective means to minimize data exploitation – and implemented via web servers that are now equipped with tracing cum identification capabilities as system learns and defends its user systems against intrusive actions.