Please enable JavaScript.
Coggle requires JavaScript to display documents.
15:5 (INTRUSION DETECTION SYSTEMS (Features (• Intrusion detection, •…
15:5
-
-
Honeypots and Honeynets
Honeypots
-
more a honeypot is targeted by an intruder, the more valuable it becomes.
technically related to IDSs and firewalls, it has no real production value as an active sentinel of networks.
-
-
Honeynets
set of multiple, linked honeypots that simulate a larger
network installation.
Hackers infiltrate the honeynet, which allows investigators to observe the hackers’ actions using a combination of surveillance technologies.
traffic on honeypots or honeynets are assumed to be suspicious because the systems are not meant for internal use.
risk that external monitoring services that create lists of untrusted sites may report the organization’s system as vulnerable,
-
-
-
the action required should be determined by management in advance and incorporated in a policy. . #
-