Mike J Nagle
unread,Sep 4, 2010, 2:16:48 PM9/4/10Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to SEC-0130 Summer 2010
7. What is a honey pot? How does this differ from a honey net?
A honey pot is a system set up with pseudo-services in such a way as
to apparently be vulnerable to outside attacks. Thus the system is a
decoy to divert attacks from important systems. Such a system is
usually configured to collect information about an attacker's
activities in order to identify attackers and document their
activities, without exposing critical systems to attack. Within the
honey pot are stored important-looking data and other fake resources
that are designed to capture an attacker's attention and, hopefully,
keep that attacker engaged long enough to permit identification of the
attacker.
The purpose of a honey pot is to invite attacks in order to protect
critical systems from attack.
A honey net is similar to a honey pot, and has the same purpose. The
difference is that a honey pot is a single host, and a honey net is an
entire subnet set up as a lure for potential attackers.
8. How does a padded cell system differ from a honey pot?
A padded cell is identical in intent and presentation to a honey pot,
but with defenses added so that it is not so easily compromised. As
well as containing interesting-looking data, a padded cell also
operates in tandem with an IDPS, which transfers attackers to a
simulated environment where attackers can do no harm.