Using Honeypots to Reduce IT Security Violations
Source: East Carolina University
Honeypots are becoming a widely used resource in Information Technology Security to gather data on hackers and their methodology of attacking a particular organization. This paper presents a general overview of honeypot technology, some advantages and disadvantages of honeypots, history of honeypots, legal issues of honeypots, and honeypot methods used to gain knowledge of hackers' habits. Other issues relating to honeypot technology will also be addressed.