You are on page 1of 5

FIREWALL AND INTRUSION

DETECTION SYSTEM

Honeypots
Honeypots
• Honeypot is a system specially set to attract and
‘Trap’ attackers who are try to attack systems or
try to penetrate into system.
• a honeypot is a fake target that is deliberately
placed on your PC or network to distract hackers
and keep them away from your confidential files.
• The attacker will then spend their time trying to
access this vulnerable PC rather than target the
real devices on your network.
Cont…
Why ?
• Honeypots are used to divert hackers from main
system where important information/ critical
system is set.
• To identify malicious activities performed by
hackers, so that we can take measures to secure
main system.
• To engage attacker for long time, so he will stay
away from main system.
Cont..
Types of honeypots
1) Production Honeypots: Used by companies
to know aim of attacker to attack on system,
also try to divert attacker from main system
and minimize risk of attack.
2) Research Honeypot: Used by organizations
for educational or research purpose only.
Cont..

You might also like