{"id":5199,"date":"2013-11-28T14:00:53","date_gmt":"2013-11-28T12:00:53","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=5199"},"modified":"2016-01-18T15:19:46","modified_gmt":"2016-01-18T13:19:46","slug":"honeypots-trapping-hackers","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2013\/11\/honeypots-trapping-hackers\/","title":{"rendered":"<!--:en-->Honey pots &#8211; trapping hackers<!--:--><!--:af-->&#8220;Honey pots&#8221; &#8211; lokaas vir krakers<!--:-->"},"content":{"rendered":"<p><!--:en--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2013\/11\/honey-jar4-396364-m.jpg\" alt=\"\" width=\"135\" height=\"180\" align=\"right\" \/>Apparently bears find honey irresistible and in the same way hackers can&#8217;t resist the challenge to gain access to a computer or system.<\/p>\n<p><span style=\"font-size: 13px; line-height: 19px;\">A\u00a0\u00a0<\/span><em style=\"font-size: 13px; line-height: 19px;\">Honey pot<\/em><span style=\"font-size: 13px; line-height: 19px;\">\u00a0is a computer system set up as a trap for\u00a0<\/span><a style=\"font-size: 13px; line-height: 19px;\" href=\"http:\/\/blogs.sun.ac.za\/it\/af\/2013\/10\/18\/hackers-and-crackers\/\" target=\"_blank\">hackers, crakers and scriptkiddies<\/a><span style=\"font-size: 13px; line-height: 19px;\">\u00a0trying to gain unauthorised access to other people or a company&#8217;s computers or systems. \u00a0The trap is set up to detect, deflect and counteract unlawful usage of information systems.<\/span><\/p>\n<p>The trap consists of a computer, data or a network site with valuable information for hackers and crackers. It appears to be part of a network, but in fact, runs completely isolated and is monitored and discreetly regulated.<\/p>\n<p>Maintenance of a\u00a0<em>honey pot <\/em>requires a large amount of attention and won&#8217;t necessarily guarantee a successful outcome. In some case it will only serve as a learning experience and hackers won&#8217;t necessarily be cornered.<\/p>\n<p>A network of these traps set up in a production environment, is called a\u00a0\u00a0<em>honeynet<\/em>. The term originated in 1999 from a paper by Lance Spitzner, founder of the\u00a0<em>Honeynet Project, <\/em>called<em>\u00a0<\/em><em>To build a Honeypot.<\/em>\u00a0(Read Spitzner&#8217;s interesting article <a href=\"http:\/\/www.spitzner.net\/honeypot.html\" target=\"_blank\">here<\/a>)<\/p>\n<p style=\"text-align: right;\">[SOURCES:\u00a0<a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/honey-pot\">http:\/\/searchsecurity.techtarget.com<\/a>\u00a0&amp; www.wikipedia.org]<\/p>\n<p><!--:--><!--:af--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2013\/11\/honey-jar4-396364-m.jpg\" width=\"135\" height=\"180\" align=\"right\" \/>Net so onweerstaanbaar soos heuning vir `n beer is, so moeilik is dit vir `n kuberkraker om `n maklik toeganklike rekenaar of stelsel te weerstaan.\u00a0<\/p>\n<p>`n <em>Honey pot<\/em> is `n rekenaarstelsel opgestel as `n lokval vir <a href=\"http:\/\/blogs.sun.ac.za\/it\/af\/2013\/10\/18\/hackers-and-crackers\/\" target=\"_blank\">kappers, krakers en <em>scriptkiddies<\/em><\/a>\u00a0wat onregmatig ander mense of maatskappye se stelsels probeer binnedring. \u00a0Die lokval word gestel om onwettige gebruik van informasiestelsels te bepaal, af te weer en teen te werk.\u00a0<\/p>\n<p>Die lokval bestaan uit `n rekenaar, data of `n webwerf wat lyk asof dit deel van `n netwerk uitmaak en waardevolle inligting vir krakers en kappers bevat. Inderwaarheid funksioneer die stelsel in isolasie en word dit deurlopend gemonitor en op diskrete wyse gereguleer.<\/p>\n<p>Instandhouding van `n <em>honey pot <\/em>vereis geweldig baie aandag en waarborg nie noodwendig `n suksesvolle resultaat nie. In sommige gevalle is dit slegs nuttig as `n leeronderving en word kappers nie noodwendig vasgetrek nie.<\/p>\n<p>`n Netwerk van hierdie lokvalle wat `n produksie-omgewing simuleer word, staan bekend as `n \u00a0<em>honeynet<\/em>. Die term het sy oorsprong in Lance Spitzner, stigter van die <em>Honeynet Project, <\/em>se gepubliseerde 1999 verhandeling <em>To build a Honeypot.<\/em>\u00a0(Lees Spitzner se interessante artikel <a href=\"http:\/\/www.spitzner.net\/honeypot.html\" target=\"_blank\">hier<\/a>)<\/p>\n<p style=\"text-align: right;\">[BRONNE:\u00a0<a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/honey-pot\">http:\/\/searchsecurity.techtarget.com<\/a>\u00a0&amp; www.wikipedia.org]<\/p>\n<\/p>\n<p><!--:--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apparently bears find honey irresistible and in the same way hackers can&#8217;t resist the challenge to gain access to a computer or system. A\u00a0\u00a0Honey pot\u00a0is a computer system set up as a trap for\u00a0hackers, crakers and scriptkiddies\u00a0trying to gain unauthorised access to other people or a company&#8217;s computers or systems. \u00a0The trap is set up [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29187],"tags":[],"class_list":["post-5199","post","type-post","status-publish","format-standard","hentry","category-security-2"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 04:01:15","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/5199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=5199"}],"version-history":[{"count":14,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/5199\/revisions"}],"predecessor-version":[{"id":9284,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/5199\/revisions\/9284"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=5199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=5199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=5199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}