Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This section covers the threat detection and prevention method of honeypots. Like attracting a ravenous bear in the woods to the sweet scent of a jar of honey, these mechanisms serve a similar goal in the world of IT security. At their most basic, honeypots act as a decoy such as by adding a pseudo flaw in an app or supplying some other loophole to entice and trap intruders. In addition, honeypots serve as a distraction away from vital resources while at the same time providing for the gathering of information on the attack and possibly the attackers as well. We note that a collection of honeypots is referred to as a "honeynet." Another technique is what is known as a padded cell or sandbox. This moves the intruder to a quarantined section of the network where their malicious actions cause no harm.