Definition of Honeypot security system – Nowadays information security is one of the things needed by the company or organization. The reason is to protect the data where the nature is confidential or sensitive. To protect the information and maintain this security is very easy, moreover, many staff of information security professionals are easy to be found. Preventing the occurrence of data theft and this information is important but the most important thing is that you can detect when the attack occurs. All you have to know is that this attack can happen in many forms and depends on the attacker’s creativity.
One way that can be used to counteract hackers by using Honeypot. There is still a lot of foreign to this Honeypot security system so that not many have made use of it. Though in practice already many can protect data and information with Honeypot security system.
The Honeypot security system is a means of being able to trap or ward off unauthorized use of an information system. Honeypot is also a distraction from the attention of hackers to make it as if it has succeeded in breaking down or retrieving information data from a network when data is not important and has been isolated. A short Honeypot notion is a system built to resemble the real system of purpose for the hackers to be distracted from being distracted into a forged system that has been built and forgotten by the main system to be in its series.
Not only to trap, however, Honeypot is also beneficial for the system administrator to perform analysis of what activity is performed by attacker or malware Propagbar in the Honeypot system. System administrators can also observe what kind of attacks you can get, how many files have been detected, and the different types of threats are relatively new.
Advantages and Disadvantages
Once you know the definition of Honeypot security system It’s good if you know what are the advantages and disadvantages of the Honeypot. The advantage is that Honeypot is able to collect data on how attackers or attacker penetrate the system and what it does while on the system, but Honeypot is also capable of optimizing the data source . Cracker can only attack your Honeypot but not attack your firewall or NIDS. Although it has many advantages on offer, Honeypot also has some weaknesses or drawbacks. The first drawback is that Honeypot will not be useful if neither attacker nor hackers are hooked with the bait so the effort is wasted.
If you don’t configure it properly, hackers, crackers, or other attacker can attack other resources on your network. Therefore, if you are not convinced by your ability to install, monitor, and maintain Honeypot you should not do this Honeypot security because it is very risky to lose data and information. In addition Honeypot configuration is complicated and risky so it takes skills and abilities that are capable in it.
Honeypot has two classifications, the first Low Interaction Honeypot, the second high interaction Honeypot. For low interaction Honeypot will only emulate a part of the service, while the high will use the whole of the system resources where Honeypot is made exactly with a real system. High Honeypot is also a whole operating system.
So understanding the Honeypot security system is important for you to know, hopefully this information is useful.