Honeypots and Honeynets
are every cyber security worker’s best friends. These tools are ultimately designed
to attract cyber attackers by intentionally exposing a vulnerable hardware or
system. One of my favorite features about these tools is that it’s being
monitored and will send out alters and messages to any suspicious activities.
Honeypots target attackers that are attempting
to sabotage a hardware whereas honeynet target attackers that are attempting to
sabotage an entire network. One of the flaws with utilizing these tools are
experienced attackers will bypass them and will attack other areas. The thing
is, these tools are isolated away from other networks, which makes it obvious
to experienced attackers. Another flaw is that they can only collect a limited
amount of data.
References:
Chapman, B., & Maymi, F. (2020). CompTIA CySA+
Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam
CS0-002). McGraw Hill Professional.
Lutkevich, B., Clark,
C., & Cobb, M. (2021). honeypot (computing). Security. https://www.techtarget.com/searchsecurity/definition/honey-pot
No comments:
Post a Comment