Presentation is loading. Please wait.

Presentation is loading. Please wait.

Uzair Masood 100111089 MASYU001.  What is a honey Pot ? “ A honey pot is an information system resource whose value lies in unauthorized or illicit use.

Similar presentations


Presentation on theme: "Uzair Masood 100111089 MASYU001.  What is a honey Pot ? “ A honey pot is an information system resource whose value lies in unauthorized or illicit use."— Presentation transcript:

1 Uzair Masood 100111089 MASYU001

2  What is a honey Pot ? “ A honey pot is an information system resource whose value lies in unauthorized or illicit use of that resource” “A honey pot is a closely monitored server, designed to be broken in to and act as a decoy for potential hackers. It lures hackers away from important or vulnerable parts of a network and towards the bait of the honey pot. “ “A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems”

3 Generally, to set up a basic honey pot you have to :  Install internet with little or no security patches,  Put some fake but interesting data on the system to attract hackers.  Install some application for recording invader activities But, on the other hand we have complex systems that work as honey pots e.g.  Honeyd: Low-interaction honeypot  Honeynets: High-interaction honeypot  Roaming Honeypots  honeydsum.pl  Single-honeypot  SPANK

4  A hacker may get into the honeypot and use the system or application it uses to attack the system it was designed to protect.  If detected, the honeypot can be used by a hacker to launch a false attack that draws attention to the honeynet and away from the real system so it can be infiltrated.  If a honeypot is recognized it stands a chance of being disabled and reprogrammed relay false information or set up to look as if it is functioning normally while it is being used to break into the primary system.  Hackers could take control of a honeypot and use it for other hacking or criminal activity.

5  Small data sets of high value  New tools and tactics  Minimal resources  Encryption or IPv6  Information  Simplicty

6  Being a starter, I would prefer using Low- interaction ones, Because, they are:  Easy to use  Easy to install  Underlying services control what a hacker and do and what he can not.  Minimum Risk.


Download ppt "Uzair Masood 100111089 MASYU001.  What is a honey Pot ? “ A honey pot is an information system resource whose value lies in unauthorized or illicit use."

Similar presentations


Ads by Google