HONEYPOTS
ABSTRACT:
Any commander will often tell his soldiers that to secure yourself against the enemy, you have to first know who your enemy is. This military doctrine readily applies to the world of network security. Just like the military, you have resources that you are trying to protect. To help protect these resources, you need to know who is your threat and how they are going to attack.
Security professionals all around the world have been searching along this line of thought. One of the tools developed as a result of this is a Honeypot. The sole purpose of a Honeypot is to look and act like a legitimate computer but actually is configured to interact with potential hackers in such a way as to capture details of their attacks. If a honeypot is successful, the intruder will have no idea that s/he is being tricked and monitored.
for more info visit.
http://www.enjineer.com/forum
No comments:
Post a Comment