Honeypot –
source - techterms.com
A honeypot is a security system designed to detect and
counteract unauthorized access or use of a computer system. The name
"honeypot" is used in reference to the way the system traps
unauthorized users, such as hackers
or spammers
so they can be identified and prevented from causing further problems.
Honeypots are different than typical security solutions
because they intentionally lure in hackers or users with malicious intent. For
example, a company may purposely create a security hole in their network that
hackers could exploit to gain access to a computer system. The system might
contain fake data that would be of interest to hackers. By gaining access to
the data, the hacker might reveal identifying information, such as an IP address,
geographical location, computer platform,
and other data. This information can be used to increase security against the
hacker and similar users.
Another example of a honeypot is an email honeypot designed to counteract
spammers. It may be configured as a fake email address that is intentionally
added to known spam lists. The email address can be used to track the servers
and relays that send spam to the honeypot account. This information can be used
to blacklist
certain IP addresses and domain names
in anti-spam databases. An email honeypot can even be used as a counterattack
tool, which forwards spam to the email addresses of identified spammers.
While honeypots are an effective way to monitor and protect
information systems, they can also be expensive to maintain. Therefore,
honeypots are used primarily by large companies and organizations, rather than
small businesses. Government and educational institutions may also deploy
research honeypots as a means of tracking unauthorized access attempts and
improving security solutions.
================================= **Important note** - contact sister company, www.tabularosa.net, for very powerful solutions for IP management (IPv4 and IPv6), security, firewall and APT solutions:
www.tabularosa.net
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
www.amazon.com/author/paulbabicki
If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I
am the founder and president of Tabula
Rosa Systems, a company that provides “best of breed” products for network,
security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT
product information for virtually anyone.
==============================================
No comments:
Post a Comment