The Use of HoneyPots and HoneyNets to Trick Hackers
By Stephen Bucaro
A honeyPot is a storage area on a network that has confidential and valuable
data. It will most likely contain names, account numbers, credit card numbers, and social
security numbers that a hacker can sell for big bucks. At least that's what a hacker
thinks they've found when they gain unauthorized access to it.
In reality false data was deliberately placed in the honeypot by network security
administrators to attract and tempt the hacker. While the unsuspecting hacker is
slimimg at his mouth thinking he's stealing valuable data, his every action is being
monitored and logged, and his location is being traced. Poor hacker.
When network security administrators do identify the hackers location, will they have
him immediately arrested and put in a cage where they belong? Well, not really, for
two reasons: 1. Most attacks come from countries like China and Russia where the U.S.
and international organizations have little authority, and 2. security administrators
prefer to study the hackers methods and learn from them for a while.
The lessons learned from monitoring the honeypot can then be used to protect the
real data on the actual production servers which are chugging away perfectly securely
while the unsuspecting hacker is entertaining himself in the honeypot. Sometimes
companies set up an entire network of false data, called a honeynet so the hacker
can really enjoy them self.
More Network Security Articles:
• Difference Between Rule and Role Based Access Control
• ARP, MAC, Poisoning, and WiFi Security
• How Snort's Stealth TCP Port Scanning Works
• Types of Computer Security Threats
• Email Security
• Design a Network Security Policy
• What Is Penetration Testing?
• How SSL (Secure Sockets Layer) Works
• Network Security Across the Enterprise
• Wireless Network Security - The Basics of Securing a Wireless LAN