![]() ![]() Honeypots can carry risks to a network, and must be handled with care. ![]() Whatever they capture can then be surmised as malicious or unauthorized. Honeypots should have no production value and hence should not see any legitimate traffic or activity. While often a computer, a honeypot can take on other forms, such as files or data records, or even unused IP address space. A honeypot that masquerades as an open proxy is known as a sugarcane.Ī honeypot is valuable as a surveillance and early-warning tool. Generally it consists of a computer, data or a network site that appears to be part of a network but which is actually isolated and protected, and which seems to contain information that would be of value to attackers. In computer terminology, a honeypot is a trap set to detect or deflect attempts at unauthorized use of information systems.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |