As in war, so in cyber defense and attack: legacy deception techniques still in use. It’s just a chess match. Who can stay out infront: the IT department defending its network or the rogue bad guys trying to get in and steal information. Here we look back at the various techniques used by the “good guys”.