What is a honeypot and how is one used to help protect the network?
What will be an ideal response?
A honeypot is a computer placed on the network perimeter to attract attackers so that they stay away from critical servers on the network; it may or may not be a bastion host. This computer is equipped with software and perhaps data files that appear to be important to the company. A honeypot might also be configured with security holes so that it seems vulnerable to known attacks. A honeypot can be located between the bastion host and internal network; if an attacker manages to get past the external packet filter to the DMZ and then scan for open ports, the attacker could get "stuck" in the honeypot-in other words, diverted from your real files by being misdirected to files of no value.
You might also like to view...
When Clear Content is selected from the Clear button options, only the ________ is removed from the cell
A) text B) fill C) comment D) hyperlink
A _________ is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
Fill in the blank(s) with the appropriate word(s).