This document discusses cyber deception techniques for detecting cyber attacks. It introduces concepts like using decoys and breadcrumbs like credential lures and file lures to detect attackers moving laterally in a network. It also discusses the MITRE attack framework and deception placement using tactics like decoys and breadcrumbs to detect attackers at each phase of an intrusion kill chain. The document is intended to provide proposal information for customers on cyber deception implementation.