Security Investigate

Using Honeypots to Reduce IT Security Violations

Download now Free registration required

Executive Summary

Honeypots are becoming a widely used resource in Information Technology Security to gather data on hackers and their methodology of attacking a particular organization. This paper presents a general overview of honeypot technology, some advantages and disadvantages of honeypots, history of honeypots, legal issues of honeypots, and honeypot methods used to gain knowledge of hackers' habits. Other issues relating to honeypot technology will also be addressed.

  • Format: HTML
  • Size: 0 KB