Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Honey pots – trapping hackers

Apparently bears find honey irresistible and in the same way hackers can’t resist the challenge to gain access to a computer or system.

A  Honey pot is a computer system set up as a trap for hackers, crakers and scriptkiddies trying to gain unauthorised access to other people or a company’s computers or systems.  The trap is set up to detect, deflect and counteract unlawful usage of information systems.

The trap consists of a computer, data or a network site with valuable information for hackers and crackers. It appears to be part of a network, but in fact, runs completely isolated and is monitored and discreetly regulated.

Maintenance of a honey pot requires a large amount of attention and won’t necessarily guarantee a successful outcome. In some case it will only serve as a learning experience and hackers won’t necessarily be cornered.

A network of these traps set up in a production environment, is called a  honeynet. The term originated in 1999 from a paper by Lance Spitzner, founder of the Honeynet Project, called To build a Honeypot. (Read Spitzner’s interesting article here)

[SOURCES: http://searchsecurity.techtarget.com & www.wikipedia.org]

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.