See what I did there? Honey. The same doctrine is used for
Honeypots. In terms of Cybersecurity, a Honeypot is an Individual Computer that
is set up as a trap for gatecrashers. (I just really wanted an excuse to use the
word gatecrasher – think intruder if you’d prefer). There is also such a thing
called Honeynets, which is multiple computers connected to form a simulated Network,
with the same purpose.
A Honeypot is a Deterrent Control. Much like the man I met
recently under circumstances that I’m not going to share; a Deterrent Control
is like a Detective. They come in after-the-fact and investigate to gather as
much information as possible before they determine what they think happened. In
other words, a Deterrent Control cannot prevent an attack from happening, but
it can observe the incident after it has happened.
Amateur Hackers beware, Honeypots are known to open common
ports. They don’t store any real data such as the data you would find in a
production system. They are merely there for the organization that deploys them
to gain valuable insight and information about different types of attacks and attack
methods are out there. If you are interested in Hacking, but would rather sit
out Amateur Hour – Fill out this contact form and I will be happy to get in
touch and discuss the different avenues that a student or professional can take
to become an Ethical Hacker, Penetration Tester, Vulnerability Assessor, etc. Fun
jobs! But you MUST – be Accountable. There are many examples of
pros in these positions who have been arrested while performing pen tests, novice
hackers who learn a little and try to play around, and more.
About the Author
Ashley Oliver is an experienced Cybersecurity Consultant, Engineer, Mentor and Teacher based in the Central New York area. Ashley has over 10 years of experience. Ashley is a SME in several areas of security including Network Security Engineering, Architecture, Policy, Standards, and Compliance. Ashley's rare and unique experience is based on her love for the Shell, and perfect design. Ashley has knowledge of NIST, and is very proficient in Layered Security, DLP, Encryption, IPSec, and more, and she is always more than willing to share and to teach.
No comments:
Post a Comment