Summary

skip navigation

honeypots for windows
Chapter 1 - An Introduction to Honeypots
Honeypots for Windows
by Roger A. Grimes
Apress 2005
progress indicator progress indicatorprogress indicator progress indicator

Honeypots are any security resource whose value lies in being probed, attacked, or compromised. They can be real operating systems or virtual environments mimicking production systems. Honeypots are often the best computer security-defense tool for the job. They can be used as an adjunct tool and to log and prevent hacking.

Honeypots are currently in the second formal stage of development, known as GenII. GenII honeypots use inline IDSs to change outgoing malicious packets into harmless traffic and use keystroke-logging software built into the kernel. Hacking attacks can be manual, automated, or blended.

Honeypots are not “install and forget it” systems. There are several steps you can take to minimize the legal risks from using a honeypot.

Chapter 2 discusses how to physically deploy your honeypot.

progress indicator progress indicatorprogress indicator progress indicator


Honeypots for Windows
Honeypots for Windows (Books for Professionals by Professionals)
ISBN: 1590593359
EAN: 2147483647
Year: 2006
Pages: 119

Similar book on Amazon
Honeypots: Tracking Hackers
Honeypots: Tracking Hackers
Know Your Enemy: Learning about Security Threats (2nd Edition)
Know Your Enemy: Learning about Security Threats (2nd Edition)
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net