Chapter 7 Questions 7 & 8

1,605 views
Skip to first unread message

Mike J Nagle

unread,
Sep 4, 2010, 2:16:48 PM9/4/10
to SEC-0130 Summer 2010
7. What is a honey pot? How does this differ from a honey net?

A honey pot is a system set up with pseudo-services in such a way as
to apparently be vulnerable to outside attacks. Thus the system is a
decoy to divert attacks from important systems. Such a system is
usually configured to collect information about an attacker's
activities in order to identify attackers and document their
activities, without exposing critical systems to attack. Within the
honey pot are stored important-looking data and other fake resources
that are designed to capture an attacker's attention and, hopefully,
keep that attacker engaged long enough to permit identification of the
attacker.

The purpose of a honey pot is to invite attacks in order to protect
critical systems from attack.

A honey net is similar to a honey pot, and has the same purpose. The
difference is that a honey pot is a single host, and a honey net is an
entire subnet set up as a lure for potential attackers.

8. How does a padded cell system differ from a honey pot?

A padded cell is identical in intent and presentation to a honey pot,
but with defenses added so that it is not so easily compromised. As
well as containing interesting-looking data, a padded cell also
operates in tandem with an IDPS, which transfers attackers to a
simulated environment where attackers can do no harm.

Elma Hartunian

unread,
Sep 12, 2010, 5:16:03 PM9/12/10
to sec-0130-s...@googlegroups.com
Thanks
Reply all
Reply to author
Forward
0 new messages