Video Description

This section covers the threat detection and prevention method of honeypots. Like attracting a ravenous bear in the woods to the sweet scent of a jar of honey, these mechanisms serve a similar goal in the world of IT security. At their most basic, honeypots act as a decoy such as by adding a pseudo flaw in an app or supplying some other loophole to entice and trap intruders. In addition, honeypots serve as a distraction away from vital resources while at the same time providing for the gathering of information on the attack and possibly the attackers as well. We note that a collection of honeypots is referred to as a "honeynet." Another technique is what is known as a padded cell or sandbox. This moves the intruder to a quarantined section of the network where their malicious actions cause no harm.

Course Modules