|About the Book|
High Quality Content by WIKIPEDIA articles! In the field of computer security, honeytokens are honeypots that are not computer systems. Their value lies not in their use, but in their abuse. As such, they are a generalization of such ideas as the honeypot and the canary values often used in stack protection schemes. Honeytokens can exist in almost any form, from a dead, fake account to a database entry that would only be selected by malicious queries, making the concept ideally suited to ensuring data integrity-any use of them is inherently suspicious if not necessarily malicious. In general, they dont necessarily prevent any tampering with the data, but instead give the administrator a further measure of confidence in the data integrity.