Cybersecurity:
-
- Phishing: Deceiving individuals into revealing personal information or downloading malware by masquerading as a trustworthy entity in electronic communications.
- Spoofing: Deceiving systems or individuals about the identity of the attacker by falsifying data such as IP addresses or email headers.
- Honey Pots: Setting up decoy systems to attract attackers and divert them from actual targets, gathering information about their techniques.
Military Tactics:
-
- Diversion: Creating a diversion to draw attention away from the main attack.
- Feints: Simulating an attack on one point to hide a real attack on another.
- Disinformation: Spreading false information to mislead the enemy about your intentions, capabilities, or locations.