Char­ac­ter­is­tics of hon­ey­pots and hon­eynets

OpenSource For You - - ADMIN -

—an at­tacker should not be able to make out that they are should not be able to use the honey­pot as a step­ping stone for fur­ther at­tacks on the In­ter­net. May con­tain dummy in­for­ma­tion, for ex­am­ple a SCADA honey­pot may con­tain a Web page re­sem­bling the gen­uine SCADA sys­tem. This will at­tract the at­tack­ers and keep them en­gaged, ul­ti­mately re­sult­ing in more time and at­tack tech­niques be­ing used on this sys­tem.

Newspapers in English

Newspapers from India

© PressReader. All rights reserved.