Title: Word of the Day
August 18, 2004 Published by  WhatIs.com

Word of the Day

WhatIs.com
LOOK IT UP     TECH HAPPENINGS     FAST REFERENCES     CAREERS        
IN THIS ISSUE:
  >  Word of the Day: honeynet
  >  Today's Tech News
  >  Brain Food
  >  Additions and Updates
SPONSORED BY:  WhatIs Product and Vendor Guide

If you would like to research the latest information and vendor listings about systems management including availability, performance, problem management and more, look no further. TechTarget has condensed this information and enables you to research and communicate with vendors all in one easy to browse location, visit today!

Click Here!

Today's Word

honeynet

A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. Although the primary purpose of a honeynet is to gather information about attackers' methods and motives, the decoy network can benefit its operator in other ways, for example by diverting attackers from a real network and its resources. The Honeynet Project, a non-profit research organization dedicated to computer security and information sharing, actively promotes the deployment of honeynets.

In addition to the honey pots, a honeynet usually has real applications and services so that it seems like a normal network and a worthwhile target. However, because the honeynet doesn't actually serve any authorized users, any attempt to contact the network from without is likely an illicit attempt to breach its security, and any outbound activity is likely evidence that a system has been compromised. For this reason, the suspect information is much more apparent than it would be in an actual network, where it would have to be found amidst all the legitimate network data. Applications within a honeynet are often given names such as "Finances" or "Human Services" to make them sound appealing to the attacker.

A virtual honeynet is one that, while appearing to be an entire network, resides on a single server.

MORE INFO:
The Honeynet Project Web site offers more information in their article, "Know your enemy: Honeynets."
SANS Institute provides a document called "Honey Pots and Honey Nets - Security through Deception."
Richard Salgado outlines some of the legal issues surrounding the use of honeynets.



Today's Tech News

Breaking through fog of Web services standards
[SearchWebServices.com]
SearchWebServices.com caught up with Anne Thomas Manes, vice president and research director for Midvale, Utah-based Burton Group, for an update on what is happening in the ever-evolving world of Web services standards.

Mydoom-S poses as funny photos
[SearchSecurity.com]
The latest member of the Mydoom family spreads through an e-mail claiming to contain funny photos, antivirus firms reported Monday.

BMC builds business policies into SQL-BackTrack
[SearchDatabase.com]
A new feature in BMC's SQL-BackTrack will allow DBAs to set up business policies across multiple systems.

More Tech News
Catch up on all the latest IT news!


Brain Food

Secret Word of the Day
This is what you do to remove a magnetic field that may have built up within your computer monitor, causing distortion of the image or color. See the answer.

Today's Trivia Question
You're probably familiar with the term "copyright", but what is "copyleft"? See the answer.

Abbreviation or Acronym QOTD
(NAS) is hard disk storage that is set up with its own network address. What does NAS stand for?
a. network-attached storage
b. network-associated storage
See the answer.

Learning Guide: Network Attached Storage (NAS)
SearchStorage.com's editors have put together a NAS Learning Guide to help the beginner, as well as the seasoned NAS veteran, navigate NAS technology.

Crash Course: Zoning
Zoning lets you allocate specific resources to specific groups, helps keep your data secure and lets you have multiple operating systems coexisting on the same SAN.

Additions and Updates

802.11m
desktop search
Wayback Machine
abfarad
Honeynet Project



Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]

Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!

SearchSecurity: Security Wire Daily
SearchSecurity: Security Alert


Not a Member? We'll activate your membership with your subscription.



ABOUT THIS E-NEWSLETTER
TechTarget This e-newsletter is published by WhatIs.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
Copyright 2004 TechTarget. All rights reserved.

To unsubscribe from "Word of the Day":
Go to unsubscribe: http://WhatIs.techtarget.com/u?track=NL-34

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Contact Us:
WhatIs
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to