Welcome to Bucaro TecHelp!

Bucaro TecHelp
HTTPS Encryption not required because no account numbers or
personal information is ever requested or accepted by this site

About Bucaro TecHelp About BTH User Agreement User Agreement Privacy Policy Privacy Site Map Site Map Contact Bucaro TecHelp Contact RSS News Feeds News Feeds

The Use of HoneyPots and HoneyNets to Trick Hackers

A honeyPot is a storage area on a network that has confidential and valuable data. It will most likely contain names, account numbers, credit card numbers, and social security numbers that a hacker can sell for big bucks. At least that's what a hacker thinks they've found when they gain unauthorized access to it.

In reality false data was deliberately placed in the honeypot by network security administrators to attract and tempt the hacker. While the unsuspecting hacker is slimimg at his mouth thinking he's stealing valuable data, his every action is being monitored and logged, and his location is being traced. Poor hacker.

When network security administrators do identify the hackers location, will they have him immediately arrested and put in a cage where they belong? Well, not really, for two reasons: 1. Most attacks come from countries like China and Russia where the U.S. and international organizations have little authority, and 2. security administrators prefer to study the hackers methods and learn from them for a while.

The lessons learned from monitoring the honeypot can then be used to protect the real data on the actual production servers which are chugging away perfectly securely while the unsuspecting hacker is entertaining himself in the honeypot. Sometimes companies set up an entire network of false data, called a honeynet so the hacker can really enjoy them self.

More Network Security Articles:
• Are You Meeting ISO 27000 Standards for Information Security Management?
• Firewall Internet Security - The Basics of a Firewall
• Digital Signatures and Certificates
• Handling Rogue Access Points
• What is a Password Hash and Salt?
• ARP, MAC, Poisoning, and WiFi Security
• Difference Between Rule and Role Based Access Control
• Network Security Across the Enterprise
• Denial of Service Attack (DoS) Detection and Mitigation
• Understanding the Different Classes of Firewalls

RSS Feed RSS Feed

Follow Stephen Bucaro Follow @Stephen Bucaro


Computer Networking Sections

Fire HD
[Site User Agreement] [Privacy Policy] [Site map] [Search This Site] [Contact Form]
Copyright©2001-2019 Bucaro TecHelp 13771 N Fountain Hills Blvd Suite 114-248 Fountain Hills, AZ 85268