Summary

skip navigation

honeypots for windows
Chapter 1 - An Introduction to Honeypots
Honeypots for Windows
by Roger A. Grimes
Apress 2005
progress indicator progress indicatorprogress indicator progress indicator

Honeypots are any security resource whose value lies in being probed, attacked, or compromised. They can be real operating systems or virtual environments mimicking production systems. Honeypots are often the best computer security-defense tool for the job. They can be used as an adjunct tool and to log and prevent hacking.

Honeypots are currently in the second formal stage of development, known as GenII. GenII honeypots use inline IDSs to change outgoing malicious packets into harmless traffic and use keystroke-logging software built into the kernel. Hacking attacks can be manual, automated, or blended.

Honeypots are not “install and forget it” systems. There are several steps you can take to minimize the legal risks from using a honeypot.

Chapter 2 discusses how to physically deploy your honeypot.

progress indicator progress indicatorprogress indicator progress indicator


Honeypots for Windows
Honeypots for Windows (Books for Professionals by Professionals)
ISBN: 1590593359
EAN: 2147483647
Year: 2006
Pages: 119

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net