O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Honeypots

Understand the basic security concepts of intrusion detection methodologies.

Up to this point, we have been looking mostly at protecting the system, network, or communication from a break-in or any other security vulnerability. A honeypot is the ultimate defense feature that works exactly in the opposite way; it is a decoy box designed to attract hackers. A honeypot usually has all the logging and tracing enabled, and its security level is lowered on purpose.

The general school of thought on honeypots is that after a hacker spots a vulnerable system, she would return more than once. The hacker can also give out the location and vulnerabilities of the system to peers of the hacker community for various reasons, not the least of which ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required