Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 23rd, 2015
Linux Advisory Watch: March 20th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Tempting Those Blackhatted Poohs with a Taste of Virtual Honey Print E-mail
User Rating:      How can I rate this item?
Source: Linux Magazine - Posted by Alex   
Network Security It isnít enough just to run a decent network and to provide essential services to your ever-wanting-more congregation of spoiled users ó you also have to protect everything from disgruntled insiders and even more disgruntled outsiders. Honeypots and honeynets give you the ability to provide a few slightly less secure systems to those honey thieves without giving away the whole hive. Larger companies hire full-time staff to secure their networks and keep them secure from the constant barrage of security-smashing attempts by those malcontented demons living in some squalid and unpronounceable distant land. Thatís the picture we place in our heads, anyway, to make us feel better about spending a tremendous amount of time and money in hopes of defeating that international spy ring bent on breaking into our high-profile and strategically crucial catering business records.

Donít laugh; that catering business holds perhaps thousands of valid credit card numbers, expiration dates and owner names in its database. And thatís enough for any Pooh to lick his chops and begin limbering up his greedy little paws for some late night intrusion attempts. Lure him away with the taste of lower-hanging fruit in a honeypot ó a virtual honeypot, that is.

Yes, there are real blackhatted Poohs out there who desire to compromise our governmentís information, to expose our corporate malfeasance, to upset our financial stability of our beloved banking system and steal credit card numbers from your catering business. The threats exist for real. The solutions also exist ó virtual honeypots and honeynets form part of those solutions.

Read this full article at Linux Magazine

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
OpenSSL Mystery Patch is No Heartbleed
Study: One-third of top websites vulnerable or hacked
Threat-sharing cybersecurity bill unveiled
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.