Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

In network security, what is a honey pot, and why is it used?

user-image
Question added by Adil Hayat , Lecturer , College of Education
Date Posted: 2016/06/09
Kasiananthan C CRISC CISA CEH
by Kasiananthan C CRISC CISA CEH , Technology Risk and Controls , BA Continuum India Private Limited (Bank of America Subsidiary)

Analyse the activities and motive of hackers. The report will be useful to identify the weak areas and build a secure network.

Adil  Hayat
by Adil Hayat , Lecturer , College of Education

A honeypot is a computer system that is set up to act as a decoy to lure cyberattackers, and to detect, deflect or study attempts to gain unauthorized access to information systems. Generally, it consists of a computer, applications, and data that simulate the behavior of a real system that appears to be part of a network but is actually isolated and closely monitored. All communications with a honeypot are considered hostile, as there's no reason for legitimate users to access a honeypot. Honeypots do help in understanding the threats network systems face, but production honeypots should not be seen as a replacement for a standard IDS. If not configured correctly they can be used to access the real production system or be used as a launch pad for attacks against other systems.

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.