A Honeypot
is a computer system that is set up to
act as a decoy to lure cyber attackers, and to study deflect or detect attempts
to gain unauthorized access to information systems. It is an additional security protection that can
be used alongside a firewall and other security solutions to help protect a
network from hackers. The basic intention of it is
to track unconventional methods of accessing the data. They are designed to
purposely engage and deceive hackers and identify malicious activities
performed over the internet. Multiple Honeypots
can be set on a network to form a Honeynet.
USES
1. Can detect and prevent cyber
attacks.
2. Simulate multiple virtual hosts simultaneously
3. Simulate numerous TCP/IP
stacks and network topology.
TYPES
1. Production
honeypots.
2. Research honeypots.
LEVELS
1. Low involvement Honeypot
2. High involvement Honeypot
Involvement
defines the level of activity a Honeypot allows an attacker.
ADVANTAGES
1. It’s simplicity and minimal risk.
2. Easier to deploy and maintain.
APPLICATIONS
1. In network security.
2. In
enterprise level security operations.
Like all technologies, honeypots have
their drawbacks too, the greatest one being their limited field of view.
Honeypots capture only activity that's directed against them and will miss
attacks against other systems. For that reason, security experts don't
recommend that these systems replace existing security technologies. Instead,
they see honeypots as a complementary technology to network- and host-based
intrusion protection.
👍👌
ReplyDelete