Honey pots have several advantages, which are as follows:

* Small set of data: Honey pots collect small amounts of data, but almost all of this data is about real attacks or unauthorized activity.
* Reduced false positives: Honey pots almost detect or capture attacks or unauthorized activities that reduce false positives.
* False negatives: Honey pots detect and record any unseen or unnoticed attacks or behavior.
* Cost effective: Honey pots only interact with malicious activity. So there is no need for high performance resources.

Honey pots also have some disadvantages, which are as follows:

* Limited View: Honey pots can only see activities that interact with them. They cannot see or capture any attacks directed against existing systems.
* Discovery and Fingerprinting: Honey pots can be easily detected and fingerprinted by several tools.
* Risk of takeover: Since there are many security holes in honey pots, a malicious attacker can takeover the honey pot and can use it to gain access and hack other networks.

Explore More

What are the steps for security evaluation?

The ethical hacking project comprises three phases, summarized as follows: 1. Preparation: In this phase, a formal contract that contains a non-disclosure clause as well as a legal clause to

Download Execution with Java

This tutorial will show you how to use java applets within your website which automatically download and execute your malware onto the visitor’s computer. Some people may of heard about

Email Servers and Ports

Email Servers and PortsThere are two servers required for sending and receiving email, i.e. the SMTP and POP servers. ## Incoming and Outgoing Mail Servers # Incoming Mail Server# :