1.

Discuss honeypots in context to Cyber Security.

Answer»

Honeypots are attack targets put up to study how DIFFERENT attackers try to EXPLOIT vulnerabilities. Honeypot is a spoof computer system that keeps track of all user transactions, interactions, and behaviours. The same idea, which is extensively utilised in academic settings, can be employed by private companies and governments to assess their risks.

Production Honeypots and research Honeypots are the two types of Honeypots available.

  • Production Honeypot: Its purpose is to collect genuine data in order for the administrator to access vulnerabilities. To IMPROVE SECURITY, they're usually installed INSIDE production networks.
  • Research Honeypot: It is employed by educational institutions and organisations for the sole aim of examining the back-hat community's reasons and strategies for targeting various networks.


Discussion

No Comment Found