• Home
  • Blog
  • Why would honeypots attract attackers?

Why would honeypots attract attackers?

0 comments

Securing your network and infrastructure requires a mix of capabilities and techniques. In the past, quite a bit of effort was focused on the prevention of an attack, but what about those times when a new or unanticipated attack gets through your defenses? Sure, you can prevent an attack by using firewalls, policies, and other technologies, but there are other things that can help. That’s where detection comes into play and where devices and technologies such as IDSs and honeypots can assist you. Consider the following questions and respond to at least three from the list:

In preparing your response, cite at least one source from professional or academic literature, such as articles from peer-reviewed journals and relevant textbooks. For this course, the use of Wikipedia is not considered an academic or professional reference. You should also be sure to proof-read and spell-check your responses. All sources should be formatted per Saudi Electronic University academic writing standards and APA style guidelines.

Be sure to support your statements with logic and argument, citing any sources referenced. Post your initial response early and check back often to continue the discussion. Be sure to respond to at least two of your peers’ posts as well.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}