A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

What is a Canary Trap?

 , updated on July 10, 2023
A canary trap is a strategy to identify the source of an information leak that involves distributing different versions of the same story to different entities. If one of the stories leaks, the entity responsible can potentially be identified.

Example

A firm has experienced its product plans being leaked to the media. The CEO believes that it is a top level executive who is the source of the leaks. The firm communicates different fictitious products to the head of marketing, sales and operations with instructions that the information is strictly confidential. If one of the stories leaks, the source may be identified.

Risks

People typically find out that you have given them incorrect information and may deduce that you don't trust them. This can backfire.
Overview: Canary Trap
Type
Definition
Distributing different versions of information to different entities to determine the source of an information leak.
Etymology
The term canary trap was coined by Tom Clancy in the novel Patriot Games. The technique existed before the term.
Related Concepts
Next: Honeypot

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
Incident Response
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Privacy By Design

An overview of privacy by design.

Expectation Of Privacy

The definition of expectation of privacy.

Personally Identifiable Information

An overview of personally identifiable information.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Risks

A definition of data risk with examples.

Personal Information

A definition of personal information with examples.

Data Subject

A definition of data subject with examples.

Machine Readable

The definition of machine readable with examples.

Delete

The definition of delete with examples.

Privacy Examples

The definition of privacy with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map