LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 21st, 2014
Linux Security Week: November 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Tempting Those Blackhatted Poohs with a Taste of Virtual Honey Print E-mail
User Rating:      How can I rate this item?
Source: Linux Magazine - Posted by Alex   
Network Security It isnít enough just to run a decent network and to provide essential services to your ever-wanting-more congregation of spoiled users ó you also have to protect everything from disgruntled insiders and even more disgruntled outsiders. Honeypots and honeynets give you the ability to provide a few slightly less secure systems to those honey thieves without giving away the whole hive. Larger companies hire full-time staff to secure their networks and keep them secure from the constant barrage of security-smashing attempts by those malcontented demons living in some squalid and unpronounceable distant land. Thatís the picture we place in our heads, anyway, to make us feel better about spending a tremendous amount of time and money in hopes of defeating that international spy ring bent on breaking into our high-profile and strategically crucial catering business records.

Donít laugh; that catering business holds perhaps thousands of valid credit card numbers, expiration dates and owner names in its database. And thatís enough for any Pooh to lick his chops and begin limbering up his greedy little paws for some late night intrusion attempts. Lure him away with the taste of lower-hanging fruit in a honeypot ó a virtual honeypot, that is.

Yes, there are real blackhatted Poohs out there who desire to compromise our governmentís information, to expose our corporate malfeasance, to upset our financial stability of our beloved banking system and steal credit card numbers from your catering business. The threats exist for real. The solutions also exist ó virtual honeypots and honeynets form part of those solutions.

Read this full article at Linux Magazine

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
Google Releases Open Source Tool for Testing Web App Security Scanners
Most Targeted Attacks Exploit Privileged Accounts
NotCompable sets new standards for mobile botnet sophistication
Hands on with Caine Linux: Pentesting and UEFI compatible
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.