O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Setting Up a Honeypot to Attract the Intruder

A somewhat controversial technique is the use of honeypots. Honeypots are intentionally opened weaknesses that are used to hold intruders on a network or server long enough to gather information on them. Like moths to a flame, hackers are very much attracted to easy targets or interesting information, such as accounting records or payroll information. A honeypot can come in many different forms. Some dedicated honeypot software packages are designed to provide false system identifications, such as pretending to be an operating system that is easier to crack. Other honeypots are as simple as conveniently named files placed on supposedly insecure systems left open on the network for hackers to stumble ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required