|
|
|
IN THIS ISSUE:
>
Word of the Day: honeynet
>
Today's Tech News
>
Brain Food
>
Additions and Updates
SPONSORED BY:
WhatIs Product and Vendor Guide
If you would like to research the latest information and vendor listings about systems management including availability, performance, problem management and more, look no further. TechTarget has condensed this information and enables you to research and communicate with vendors all in one easy to browse location, visit today!
Click Here!
|
honeynet
A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey
pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Although the primary purpose of a honeynet is to gather information about attackers' methods and motives, the decoy network can benefit its operator in other ways, for example by diverting attackers from a real network and its resources. The Honeynet
Project, a non-profit research organization dedicated to computer security and information sharing, actively promotes the deployment of honeynets.
In addition to the honey pots, a honeynet usually has real applications and services so that it seems like a normal network and a worthwhile target. However, because the honeynet doesn't actually serve any authorized users, any attempt to contact the network from without is likely an illicit attempt to breach its security, and any outbound activity is likely evidence that a system has been compromised. For this reason, the suspect information is much more apparent than it would be in an actual
network, where it would have to be found amidst all the legitimate network data. Applications within a honeynet are often given names such as "Finances" or "Human Services" to make them sound appealing to the attacker.
A virtual honeynet is one that, while appearing to be an entire network, resides on a single server.
MORE INFO:
> The Honeynet Project Web site offers more information in their article, "Know your enemy: Honeynets."
> SANS Institute provides a document called "Honey Pots and Honey Nets - Security through Deception."
> Richard Salgado outlines some of the legal issues surrounding the use of honeynets.
Breaking through fog of Web services standards
[SearchWebServices.com]
SearchWebServices.com caught up with Anne Thomas Manes, vice president and research director for Midvale, Utah-based Burton Group, for an update on what is happening in the ever-evolving world of Web services standards.
Mydoom-S poses as funny photos
[SearchSecurity.com]
The latest member of the Mydoom family spreads through an e-mail claiming to contain funny photos, antivirus firms reported Monday.
BMC builds business policies into SQL-BackTrack
[SearchDatabase.com]
A new feature in BMC's SQL-BackTrack will allow DBAs to set up business policies across multiple systems.
More Tech News
Catch up on all the latest IT news!
Secret Word of the Day
This is what you do to remove a magnetic field that may have built up within your computer monitor, causing distortion of the image or color. See the answer.
Today's Trivia Question
You're probably familiar with the term "copyright", but what is "copyleft"? See the answer.
Abbreviation or Acronym QOTD
(NAS) is hard disk storage that is set up with its own network address. What does NAS stand for?
a. network-attached storage
b. network-associated storage See the answer.
Learning Guide: Network Attached Storage (NAS)
SearchStorage.com's editors have put together a NAS Learning Guide to help the beginner, as well as the seasoned NAS veteran, navigate NAS technology.
Crash Course: Zoning
Zoning lets you allocate specific resources to specific groups, helps keep your data secure and lets you have multiple operating systems coexisting on the same SAN.
802.11m
desktop search
Wayback Machine
abfarad
Honeynet Project
|
|
|
|
|
|
|
|
|
|
|
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
|
|
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!
|
SearchSecurity: Security Wire Daily |
|
SearchSecurity: Security Alert |
|
|
Not a Member? We'll activate your membership with your subscription. |
|
|
|
|
|
|
|
|
|