Jump to content

Listening to TWiET thinking, how to set up and use a honey pot would be a good security episode w...


G+_Jason Perry
 Share

Recommended Posts

I agree.

And related to it... it you are using one, how to keep it from being an attractant (indirect exposure) to the rest of your (hidden) infrastructure/system. If I were engaging in intrusion, and found a honeypot ... I would tend to think "okay... that was too easy. What is this trying to distract me from finding?" and then dig deeper.

Link to comment
Share on other sites

 Share

×
×
  • Create New...