![]() ![]() ![]() For example, a honeypot could mimic a company's customer billing system - a frequent target of attack for criminals who want to find credit card numbers. The honeypot looks like a real computer system, with applications and data, fooling cybercriminals into thinking it's a legitimate target. It mimics a target for hackers, and uses their intrusion attempts to gain information about cybercriminals and the way they are operating or to distract them from other targets. It's a sacrificial computer system that’s intended to attract cyberattacks, like a decoy. In computer security terms, a cyber honeypot works in a similar way, baiting a trap for hackers. Often, an enemy spy is compromised by a honey trap and then forced to hand over everything he/she knows. ![]() One honeypot definition comes from the world of espionage, where Mata Hari-style spies who use a romantic relationship as a way to steal secrets are described as setting a ‘honey trap’ or ‘honeypot’. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |