Honeypots

Understand the basic security concepts of intrusion detection methodologies.

Up to this point, we have been looking mostly at protecting the system, network, or communication from a break-in or any other security vulnerability. A honeypot is the ultimate defense feature that works exactly in the opposite way; it is a decoy box designed to attract hackers. A honeypot usually has all the logging and tracing enabled, and its security level is lowered on purpose.

The general school of thought on honeypots is that after a hacker spots a vulnerable system, she would return more than once. The hacker can also give out the location and vulnerabilities of the system to peers of the hacker community for various reasons, not the least of which ...

Get Security+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.