Wednesday, August 24, 2016

Cyber Security: Honeypots

Honeypots
Sometimes network administrators want to study attacks, either so the attackers’ methods can be understood more fully and countermeasures prepared, or as part of an investigation that might lead to civil or criminal prosecutions.

Implementing Cisco Network Security (IINS) v3.0 e-learning course

One method of safely studying an attack is to deflect attackers towards an isolated computer or network which appears to be completely legitimate, but is in fact a closely-monitored trap known as a honeypot. There, every action performed by the attacker can be recorded and analysed without risking important data.

Cisco Security and Virtual Private Network (VPN) courses

Honeypots are also used by researchers to identify new attacks that are circulating in the hacking community, as well as by anti-spam organisations which use them to identify the location and identities of spam email senders.

Cisco E-Learning for ICND1 v2.0 180-day subscription

No comments:

Post a Comment