You are on page 1of 7

HONEY POTS 🍯

 honeypot is a decoy computer system


for trapping hackers or tracking
unconventional or new hacking

Definition 🍯 methods. Honeypots are designed to


purposely engage and deceive
hackers and identify malicious
activities performed over the Internet.
 Production Honeypot: Used by companies and
corporations for the purpose of researching the motives of
hackers as well as diverting and mitigating the risk of
Types of attacks on the overall network.

Honeypots  Research Honeypot: Used by nonprofit organizations

🍯 and educational institutions for the sole purpose of


researching the motives and tactics of the hacker
community for targeting different networks.
Understanding
Honeypots 🍯
 In 2015, Symantec, Norton’s parent company, set up a
Examples of honeypot to attract attacks on so-called Internet of Things
(IoT) devices. These are internet-connected items, such
honeypots as home routers, digital video recorders, and cameras.
🍯and their Symantec’s IoT honeypot worked. As reported in the
company’s 2017 Internet Security Threat Report, attacks
benefits on the honeypot almost doubled from January to
December 2016.
 in the case of Symantec’s IoT honeypot, researchers
were able to determine a lot of things, including these:
 Countries from which attacks originated. China, the U.S.,
Russia, Germany, and Vietnam made up the top five.
What can (These metrics measured the countries in which the IP
address of the attacking device was based, but does not
experts learn necessarily mean the attackers themselves operated from
from honeypot these countries.)
data?  Passwords attempted — “admin” was No. 1, and
“123456” wasn’t far behind.
 The need for baseline security standards on IoT devices
— to make them less vulnerable to attack.
 Two or more honeypots on a network form a honey net.
Typically, a honey net is used for monitoring a larger
and/or more diverse network in which one honeypot may
Honeynets not be sufficient. Honey nets and honeypots are usually
implemented as parts of larger network intrusion detection
systems

You might also like