Network Security (Honeypots)

Páginas: 4 (827 palabras) Publicado: 1 de agosto de 2011
The Honeypot system was first introduced by the most recognized Name in computer security as Cliff Stoll in the book “The cuckoo's eggs”, and the work of Bill Cheswick “An evening with Beefed”, sincethen the Honeypot has evolved into a powerful security tool today. At the beginning, Honeypot was used to fool and offer an easy material to divert the gaze of an attacker of the real services ofthe business. They are becoming a key component of security network. The challenge of Honeypot, now more than ever, is foster joint learning and sharing information across the system of layers ofprotection against intrusion.
The definition according of Honeynet Research Alliance founder Talabis Ryan (2005, p01) “A Honeypot is a security resource whose value is in being probed, attacked orcompromised”. On a computer, a Honeypot is a trap to detect, divert and somehow, counter attempts at unauthorized network activity. A Honeypot is defined as a tool to detect a potential attack onnetwork system resources, through real or virtual machine clusters, and can yield early warnings of an attack and collect information during and after the attack. The primary purpose of the implementationof effective network security, like Honeypots, provides a break against an attacker and keeps them from getting into a networked computer and performing damaging activities. A Honeypots is aneffective security system used to collect information about the attackers and their technical tools, and detect signs of an intrusion in a timely manner due to the warning mechanisms.


It isimportant to understand the complexity of the Honeypots; they consist of activating a server filled with tempting files, made difficult but not impossible to penetrate, and then just expect to appearintruders. The Honeypot gives a large space the attacker to traverse and have obstacles with high enough to beat up them, but without exaggeration to not to discourage them and allow us to know our...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Network perimeter security assuranc
  • Nsauditor Network Security
  • Funcionamiento, Ventajas yDesVentajas De The Internet, Voice And Data Delivery Networks, Network Security, Network...
  • Security
  • Security
  • security
  • Security
  • Security

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS