Wednesday 22 April 2015

What is Honeypoting in (Computing) –?

Honeypot is a trap set to detect or deflect or in some matter counteract attempts at unauthorized use of information systems. Also it is a security resource who’s values lies in being probed or attacked or compromised. This maybe legal but Honeypoting can be manipulated to work for the person in acquiring their personal details.
 They are loads of different honeypots just to name a few
Production honeypot- are easy to use they capture only limited information and are used primarily by companies or corporations. Production honeypots are placed inside the production network with other production servers by an organization to improve their overall state of security. Normally, production honeypots are low-interaction honeypots, which are easier to deploy. They give less information about the attacks or attackers than research honeypots do.
Pure honeypots- are full-fledged production systems. The activities of the attacker are monitored by using a casual tap that has been installed on the honeypot's link to the network. No other software needs to be installed. Even though a pure honeypot is useful, stealthiness of the defense mechanisms can be ensured by a more controlled mechanism.
Research honeypots- Are run to gather information about the motives and tactics of the black hat community targeting different networks. These honeypots do not add direct value to a specific organization instead they are used to research the threats that organizations face to learn how to better protect themselves.
 


click the link below for real stories in Honeypoting.
 
 
 
 
 
 
 
 
 
 
 
 
 

No comments:

Post a Comment