A honeypot is a decoy computer system for trapping hackers or tracking
unconventional or new hacking methods. Honeypots are designed to
purposely engage and deceive hackers and identify malicious activities
performed over the Internet.
Multiple honeypots can be set on a network to form a honeynet.
There are many advantages to honeypots. The main one is the ease with which they are employed. Another advantage is that although honeypots seek small amounts of hacker information, the information is considered highly valuable for studying and uncovering hackers' motivations.
Honeypot systems are not perfect, however. They contain the usual technology risks such as firewall penetration, broken encryption methods and failure to detect attacks. In addition, honeypots are unable to detect attacks against systems that are not honeypot systems.
There are two different kinds of honeypots. They are classified based on their deployment method:
Multiple honeypots can be set on a network to form a honeynet.
There are many advantages to honeypots. The main one is the ease with which they are employed. Another advantage is that although honeypots seek small amounts of hacker information, the information is considered highly valuable for studying and uncovering hackers' motivations.
Honeypot systems are not perfect, however. They contain the usual technology risks such as firewall penetration, broken encryption methods and failure to detect attacks. In addition, honeypots are unable to detect attacks against systems that are not honeypot systems.
There are two different kinds of honeypots. They are classified based on their deployment method:
- Production Honeypot: Used by companies and corporations for the purpose of researching the motives of hackers as well as diverting and mitigating the risk of attacks on the overall network.
- Research Honeypot: Used by nonprofit organizations and educational institutions for the sole purpose of researching the motives and tactics of the hacker community for targeting different networks.