Cyber security news for all


    Honeypot As A Computer Terminology For Security Mechanism

    Honeypots are computer systems or network components designed to attract attackers. They can be used to study attack methods, distract them from other systems, or set a trap for hackers.


    The term honeypot is a computer system that is intended to attract attacks. The goal of the honeypot is to mislead the attacker, to distract him from the actual target, to log and analyze his attack methods or to identify the attacker. The apparent target can be a software, PC, server or a network component. It presents itself as an interesting target for attack and may have security holes.

    How A Honeypot Works

    A honeypot should behave like a real computer or a real network. The systems are isolated on the inside and specially monitored. By installing special software on the systems, it is possible to identify attacks, record activities and trace the origin of the attacks. The purpose of this software is to identify a hacker or to gain experience with the different attack methods. Real services and applications or fake data can be found on the system so that a honeypot appears as real as possible to the attacker. However, since these applications are not used by normal users, it can be assumed that every contact with the services or every use of the applications is likely to have an improper background. A virtual honeypot is implemented on a single server, which behaves like a complete network to the outside world. This means that you only need a single and not several systems to simulate a vulnerable network.

    Low-Interaction Honeypots

    Honeypots with a low degree of interactivity are essentially based on the imitation of real systems or applications. Services and functions are usually only simulated to the extent that an attack is possible.

    High-Interaction Honeypots

    Honeypots with a high degree of interactivity are generally real systems that offer server services and therefore have to be monitored and secured well. If a high-interaction honeypot is not adequately shielded from the most productive, there is a risk that an attacker could take it over, infiltrate the system to be protected or initiate attacks on other servers in the network.

    Recent Articles

    Twitter confirmed to bring back account verification

    Twitter is bringing back verifications for the account verification in the beginning of 2021. Certain users will then be given a control mark again,...

    350,000 Spotify users were hacked

    At the beginning of July this year, security researchers discovered an unsecured database that contained access and other information from 350,000 Spotify users. Spotify...

    Europol sees artificial intelligence as a dangerous cyber threat

    Cyber criminals can use intelligence to carry out attacks more easily and thus cause more damage. Europol is warning of this in a joint...

    Telegram messenger a disaster in terms of privacy

    Telegram messenger is becoming more and more a secure chat with privacy in certain circles. But even very simple reports, which everyone can carry...

    Enisa reports weak IT security about the European railway sector

    With 470 billion passenger kilometers and many routes per year in Europe, the rail industry plays a large and rapidly growing role in transportation....

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox