What is a honeypot and how is one used to help protect the network?
What will be an ideal response?
A honeypot is a computer placed on the network perimeter to attract attackers so that they stay away from critical servers on the network; it may or may not be a bastion host. This computer is equipped with software and perhaps data files that appear to be important to the company. A honeypot might also be configured with security holes so that it seems vulnerable to known attacks. A honeypot can be located between the bastion host and internal network; if an attacker manages to get past the external packet filter to the DMZ and then scan for open ports, the attacker could get "stuck" in the honeypot-in other words, diverted from your real files by being misdirected to files of no value.
You might also like to view...
What was John von Neumann’s contribution to computing?
What will be an ideal response?
A WiFi ________is a wireless access point that is available in many public locations
Fill in the blank(s) with correct word
In Word, you can split the screen and look at two different parts of the same document at the same time
Indicate whether the statement is true or false
What Linux command(s) allow a normal user to perform operations that require advanced, or root, privileges?
Fill in the blank(s) with the appropriate word(s).