REQUIREMENTS

  1. Data Control

    This defines the specific requirements for data control.

    1. Must have both automated and manual data control. In other words, data control can be implemented via an automated response or manual intervention.

    2. At least two layers of data control to protect against failure.

    3. Be able to maintain state of all inbound and outbound connections.

    4. Be able to control any unauthorized activity. Unauthorized activity is defined by the policy of the Honeynet administrator. This implies some type of control to ensure non-Honeynet systems are not harmed.

    5. Data control enforcement must be configurable by the administrator at any time.

    6. Control connections in a manner as difficult as possible to be detected by attackers.

    7. At least two methods of alerting ...

Get Honeypots: Tracking Hackers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.