SOC Experts Community - Beta
0 like 0 dislike
in Security Concepts by (1.2k points)

2 Answers

0 like 0 dislike
by (5k points)

Generally, a honeypot operation consists of a computer, applications and data that simulate the behavior of a real system and appears as part of a network; however, the honeypot is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with a honeypot should be considered hostile.

For more information

0 like 0 dislike
by (300 points)
Honeypot is a server which is hosted as part of security tactic which appears to have sensitive information to lure the attackers.


Honeypots deviates the attackers concentration from actual servers towards it.

Honeypots can be used to study the behavior of attackers.

SOC Experts - No. 1 Job Oriented Cybersecurity Training Program

View our Courses