<s>
In	O
the	O
field	O
of	O
computer	O
security	O
,	O
honeytokens	B-Protocol
are	O
honeypots	O
that	O
are	O
not	O
computer	O
systems	O
.	O
</s>
<s>
Honeytokens	B-Protocol
do	O
not	O
necessarily	O
prevent	O
any	O
tampering	O
with	O
the	O
data	O
,	O
but	O
instead	O
give	O
the	O
administrator	B-Application
a	O
further	O
measure	O
of	O
confidence	O
in	O
the	O
data	O
integrity	O
.	O
</s>
<s>
Honeytokens	B-Protocol
are	O
fictitious	O
words	O
or	O
records	O
that	O
are	O
added	O
to	O
legitimate	O
databases	O
.	O
</s>
<s>
Different	O
honeytokens	B-Protocol
would	O
be	O
in	O
each	O
set	O
of	O
records	O
.	O
</s>
<s>
If	O
they	O
are	O
chosen	O
to	O
be	O
unique	O
and	O
unlikely	O
to	O
ever	O
appear	O
in	O
legitimate	O
traffic	O
,	O
they	O
can	O
also	O
be	O
detected	O
over	O
the	O
network	O
by	O
an	O
intrusion-detection	O
system	O
(	O
IDS	O
)	O
,	O
alerting	O
the	O
system	B-Application
administrator	I-Application
to	O
things	O
that	O
would	O
otherwise	O
go	O
unnoticed	O
.	O
</s>
<s>
by	O
dropping	O
all	O
packets	B-Protocol
containing	O
the	O
honeytoken	B-Protocol
at	O
the	O
router	O
.	O
</s>
<s>
However	O
,	O
such	O
mechanisms	O
have	O
pitfalls	O
because	O
it	O
might	O
cause	O
serious	O
problems	O
if	O
the	O
honeytoken	B-Protocol
was	O
poorly	O
chosen	O
and	O
appeared	O
in	O
otherwise	O
legitimate	O
network	O
traffic	O
,	O
which	O
was	O
then	O
dropped	O
.	O
</s>
<s>
Honeytokens	B-Protocol
can	O
exist	O
in	O
many	O
forms	O
,	O
from	O
a	O
dead	O
,	O
fake	O
account	O
to	O
a	O
database	O
entry	O
that	O
would	O
only	O
be	O
selected	O
by	O
malicious	O
queries	O
,	O
making	O
the	O
concept	O
ideally	O
suited	O
to	O
ensuring	O
data	O
integrity	O
.	O
</s>
<s>
A	O
particular	O
example	O
of	O
a	O
honeytoken	B-Protocol
is	O
a	O
fake	O
email	O
address	O
used	O
to	O
track	O
if	O
a	O
mailing	O
list	O
has	O
been	O
stolen	O
.	O
</s>
