A honey pot is a computer system on the Internet that is expressly set up to attract and "trap"
people who attempt to penetrate other people's computer systems. (This includes the hacker, cracker, and
script
kiddy.) To set up a honey pot, it is recommended that you:
- Install the operating system without patches
installed and using typical defaults and options
- Make sure that there is no data on the system that cannot safely be destroyed
- Add the application that is designed to record the activities of the invader
Maintaining a honey pot is said to require a considerable amount of attention and may offer as
its highest value nothing more than a learning experience (that is, you may not catch any
hackers).
This was last updated in May 2007
Email Alerts
Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy
More News and Tutorials
-
Adobe Reader X uses Microsoft's sandboxing technology to block potentially dangerous processes from executing beyond the confines of the software.
-
Microsoft repaired four vulnerabilities in its Forefront Unified Access Gateway and a critical flaw in Microsoft Office.
-
Download the entire October 2010 issue of Information Security magazine here in PDF format.
-
Articles
-
Resources from around the Web