Can honey attract flies ..... (Week 4)
A primary security goal for businesses and organizations is
to ensure their network is secure. Making sure that everything stays up to
date, and proper security measures are in place to keep attackers out.
What if I told you that there is a method that does the
exact opposite, and intentionally? Yes, you read that right. The method I’m
referring to is called Honeypot. Essentially, it is a fake system that is used
to attract threat actors. It’s made to look legit, and to portray something of
high value. By using this method, it can allow people to analyze the attacker’s
abilities, the type of attack used, and the complexity of it.
While this may seem like a great way to distract attackers
from targeting the ‘real’ system, it does have its drawbacks. The biggest drawback
is the cost of this, as it requires dedicated system, such as its own hardware
and software. Additionally, it would need to be on a completely separate network.
This could be a great tool for some business or
organizations… but sometimes it’s important to weigh the pros and cons, as this
may not be ideal or suitable. However, this could be ideal for those looking to
study different real world attack methods, and coming up with better ways to
combat attacks.
Comments
Post a Comment