ابدأ بالتواصل مع الأشخاص وتبادل معارفك المهنية

أنشئ حسابًا أو سجّل الدخول للانضمام إلى مجتمعك المهني.

متابعة

In network security, what is a honey pot, and why is it used?

user-image
تم إضافة السؤال من قبل Adil Hayat , Lecturer , College of Education
تاريخ النشر: 2016/06/09
Kasiananthan C CRISC CISA CEH
من قبل Kasiananthan C CRISC CISA CEH , Technology Risk and Controls , BA Continuum India Private Limited (Bank of America Subsidiary)

Analyse the activities and motive of hackers. The report will be useful to identify the weak areas and build a secure network.

Adil  Hayat
من قبل Adil Hayat , Lecturer , College of Education

A honeypot is a computer system that is set up to act as a decoy to lure cyberattackers, and to detect, deflect or study attempts to gain unauthorized access to information systems. Generally, it consists of a computer, applications, and data that simulate the behavior of a real system that appears to be part of a network but is actually isolated and closely monitored. All communications with a honeypot are considered hostile, as there's no reason for legitimate users to access a honeypot. Honeypots do help in understanding the threats network systems face, but production honeypots should not be seen as a replacement for a standard IDS. If not configured correctly they can be used to access the real production system or be used as a launch pad for attacks against other systems.

المزيد من الأسئلة المماثلة

هل تحتاج لمساعدة في كتابة سيرة ذاتية تحتوي على الكلمات الدلالية التي يبحث عنها أصحاب العمل؟