November 2018
Intermediate to advanced
382 pages
11h 20m
English
You can gather some types of threat intelligence on your own. Honeypots can be deployed within your infrastructure to capture information on the specific types of attacks that your networks are facing. Honeypots can be useful for getting an early warning of attacks or for capturing data for forensic analysis. You can set up your honeypot on a Demilitarized Zones (DMZ) where it is contained from your other network assets, or you can distributed honeypot IoT devices on the same segments as your other devices. Ensure that you monitor the activities on your honeypots.