Honeypot Tutorials : Modes and Working of Honeypot

Posted by nextstep4it on Jul 8, 2013 6:14 AM EDT
NextStep4it.com
Mail this story
Print this story

For every business organization on Internet, viruses, worms, and crackers are but a few security threats. Above all we cannot tell as to when, where and how our data or any other valuable information will be compromised. The only thing we can do to ensure the safety of our data is to take preventive measures. Honeypots are one such preventive software that are employed in a network to study the trail of unauthorized access and at the same time alert the network administrator of a possible intrusion. Actually, it is a trap set to detect attempts at unauthorized use of information system. The attacker always thinks that he is extracting some useful information but in turn a honeypot installed system attracts him away from the critical resources and traps him by following his trail. The value of a Honeypot lies in unauthorized and illicit use of that resource.

For every business organization on Internet, viruses, worms, and crackers are but a few security threats. Above all we cannot tell as to when, where and how our data or any other valuable information will be compromised. The only thing we can do to ensure the safety of our data is to take preventive measures. Honeypots are one such preventive software that are employed in a network to study the trail of unauthorized access and at the same time alert the network administrator of a possible intrusion.

Full Story

  Nav
» Read more about: Story Type: News Story

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.