1 / 6

Honey Pots

Honey Pots. Uzair Masood 100111089 MASYU001. Honey Pots - Introduction. What is a honey Pot ? “ A honey pot is an information system resource whose value lies in unauthorized or illicit use of that resource”

cachet
Télécharger la présentation

Honey Pots

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Honey Pots UzairMasood 100111089 MASYU001

  2. Honey Pots - Introduction • What is a honey Pot ? “A honey pot is an information system resource whose value lies in unauthorized or illicit use of that resource” “A honey pot is a closely monitored server, designed to be broken in to and act as a decoy for potential hackers. It lures hackers away from important or vulnerable parts of a network and towards the bait of the honey pot. “ “A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems”

  3. Honey Pots - How they work ? Generally, to set up a basic honey pot you have to : • Install internet with little or no security patches, • Put some fake but interesting data on the system to attract hackers. • Install some application for recording invader activities But, on the other hand we have complex systems that work as honey pots e.g. • Honeyd: Low-interaction honeypot • Honeynets: High-interaction honeypot • Roaming Honeypots • honeydsum.pl • Single-honeypot • SPANK

  4. Honey Pots - Risks • A hacker may get into the honeypot and use the system or application it uses to attack the system it was designed to protect. • If detected, the honeypot can be used by a hacker to launch a false attack that draws attention to the honeynet and away from the real system so it can be infiltrated. • If a honeypot is recognized it stands a chance of being disabled and reprogrammed relay false information or set up to look as if it is functioning normally while it is being used to break into the primary system. • Hackers could take control of a honeypot and use it for other hacking or criminal activity.

  5. Honey Pots - Advantages • Small data sets of high value • New tools and tactics • Minimal resources • Encryption or IPv6 • Information • Simplicty

  6. Honey Pots - Recomendations • Being a starter, I would prefer using Low-interaction ones, Because, they are: • Easy to use • Easy to install • Underlying services control what a hacker and do and what he can not. • Minimum Risk.

More Related