Setting Up a Honeypot to Attract the Intruder

A somewhat controversial technique is the use of honeypots. Honeypots are intentionally opened weaknesses that are used to hold intruders on a network or server long enough to gather information on them. Like moths to a flame, hackers are very much attracted to easy targets or interesting information, such as accounting records or payroll information. A honeypot can come in many different forms. Some dedicated honeypot software packages are designed to provide false system identifications, such as pretending to be an operating system that is easier to crack. Other honeypots are as simple as conveniently named files placed on supposedly insecure systems left open on the network for hackers to stumble ...

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.