SOC Experts Community - Beta
0 like 0 dislike
49 views
in Security Concepts by (1.2k points)

2 Answers

0 like 0 dislike
by (5k points)

Generally, a honeypot operation consists of a computer, applications and data that simulate the behavior of a real system and appears as part of a network; however, the honeypot is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with a honeypot should be considered hostile.

For more information 

https://searchsecurity.techtarget.com/definition/honey-pot

0 like 0 dislike
by (300 points)
Honeypot is a server which is hosted as part of security tactic which appears to have sensitive information to lure the attackers.

Advantages:

Honeypots deviates the attackers concentration from actual servers towards it.

Honeypots can be used to study the behavior of attackers.

SOC Experts - No. 1 Job Oriented Cybersecurity Training Program

View our Courses

Categories

...