FIREWALL AND INTRUSION DETECTION SYSTEM Honeypots Honeypots Honeypot

  • Slides: 5
Download presentation
FIREWALL AND INTRUSION DETECTION SYSTEM Honeypots

FIREWALL AND INTRUSION DETECTION SYSTEM Honeypots

Honeypots • Honeypot is a system specially set to attract and ‘Trap’ attackers who

Honeypots • Honeypot is a system specially set to attract and ‘Trap’ attackers who are try to attack systems or try to penetrate into system. • a honeypot is a fake target that is deliberately placed on your PC or network to distract hackers and keep them away from your confidential files. • The attacker will then spend their time trying to access this vulnerable PC rather than target the real devices on your network.

 Cont… Why ? • Honeypots are used to divert hackers from main system

Cont… Why ? • Honeypots are used to divert hackers from main system where important information/ critical system is set. • To identify malicious activities performed by hackers, so that we can take measures to secure main system. • To engage attacker for long time, so he will stay away from main system.

 Cont. . Types of honeypots 1) Production Honeypots: Used by companies to know

Cont. . Types of honeypots 1) Production Honeypots: Used by companies to know aim of attacker to attack on system, also try to divert attacker from main system and minimize risk of attack. 2) Research Honeypot: Used by organizations for educational or research purpose only.

 Cont. .

Cont. .