Sunday, March 1, 2015


Honeypots
Honeypots are typically used in one of two main fashions: as part of an organization’s computer network monitoring and defense, and by security researchers who are trying to keep up with the activities of blackhats.
Production environment Honeypots deployed in a production environment serve to alert ad- ministrators to potential attacks in real time. Because of the advanced level of logging and information that is available on a honeypot, better defenses against the attacks may be able to be devised for implementation on the real servers. Production honeypots tend to be reactive in nature.
Research environment In a research environment, security analysts are trying to figure out what the next generation of attacks by malicious users will be. These honeypots can be quite dynamic, as they are adjusted and tweaked to lure attackers and respond to new attack strategies. Often a research honeypot is actively monitored by a person in real time.

No comments:

Post a Comment