What is a honeypot and how is one used to help protect the network?

What will be an ideal response?

A honeypot is a computer placed on the network perimeter to attract attackers so that they stay away from critical servers on the network; it may or may not be a bastion host. This computer is equipped with software and perhaps data files that appear to be important to the company. A honeypot might also be configured with security holes so that it seems vulnerable to known attacks. A honeypot can be located between the bastion host and internal network; if an attacker manages to get past the external packet filter to the DMZ and then scan for open ports, the attacker could get "stuck" in the honeypot-in other words, diverted from your real files by being misdirected to files of no value.

Computer Science & Information Technology

You might also like to view...

When Clear Content is selected from the Clear button options, only the ________ is removed from the cell

A) text B) fill C) comment D) hyperlink

Computer Science & Information Technology

A _________ is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology