Posts

Showing posts from January, 2026

Can honey attract flies ..... (Week 4)

  A primary security goal for businesses and organizations is to ensure their network is secure. Making sure that everything stays up to date, and proper security measures are in place to keep attackers out. What if I told you that there is a method that does the exact opposite, and intentionally? Yes, you read that right. The method I’m referring to is called Honeypot. Essentially, it is a fake system that is used to attract threat actors. It’s made to look legit, and to portray something of high value. By using this method, it can allow people to analyze the attacker’s abilities, the type of attack used, and the complexity of it. While this may seem like a great way to distract attackers from targeting the ‘real’ system, it does have its drawbacks. The biggest drawback is the cost of this, as it requires dedicated system, such as its own hardware and software. Additionally, it would need to be on a completely separate network. This could be a great tool for some business or...