Tel: 03333 200 222
Email: [email protected]

What is a Honeypot in cyber security?

05/01/2023
2 minute read
Honeypot is a network-attached system set up as a decoy (fake) system deployed by people, organisations and other entities, designed to appear as a high-value asset like a server to log user activity and the way they approach the system to hack it or do any other activity.
By, Jack Wong
Share

A honeypot in cyber security is a network-attached system set up as a decoy (fake) system deployed by people, organisations and other entities. It is designed to appear as a high-value asset like a server to log user activity and how they approach the system to hack it or do any other activity.

A honeypot is also designed to look like any digital asset, such as software programs, servers and networks. The purpose of a honeypot is to pretend to look like a potential target to hackers. This is meant to convince the adversary that they have accessed the current system and encourage them to spend time within this controlled environment. All the information collected from honeypots is helping companies develop and enhance their cyber security strategy in response to potential real-world threats.

How do Honeypots work in cyber security? 

Honeypot can track cybercriminals actions to have a better understanding of their methods and motivations. In fact, organisations can rely on the information collected by Honeypot to develop security protocols to prevent similar attacks in the future. Below are some features of Honeypots.

  • Logs the user’s IP address
  • Logs the keystrokes submitted by the user
  • The resources the user has modified, deleted and accessed

Types of Honeypots in cyber security

Low-interaction honeypots

These types of honeypots run on limited services and have restricted permissions; they can be used to track UDP, TCP, IIC, CMP and other protocols/services. In short, low-interaction honeypots only track the user’s IP address.

Medium-interaction honeypots

These are based on real-time functioning operating systems. They have the same services as the actual application. The purpose of this honeypot is to collect more information on the attack so the organisation can take extra time when medicating the attack.

High-interaction honeypots

These types of honeypots are real applications are vulnerable, hard to maintain, but the success rates are high. Attackers normally think it might be vulnerable, so they will decide to hack it and get blocked eventually. In that case, the organisation will be able to collect some information and understand how the attacker hacked this machine; therefore, they can prevent future attacks.

Pure honeypots

These types of honeypots are deployed in real working environments. Once the attackers see them, they will directly spend time enumerating and exploiting them. The organisation will be alerted and understand how the attackers hack the real system.

Honeypot Benefits

  • Real data collection
  • Fewer false positive intruder alerts
  • Cost-effectiveness
  • Encryption circumvention

More from Swiftcomm

Signs It’s Time to Update Your Office Phone System
Your office phone system might still work, but that doesn’t necessarily mean it’s still working for you. As your business and the way your team works evolves, it’s important to ensure you’re set up for success. Find out more about the key signs that indicate it’s time for an upgrade.
Full Article
right-chevron
AI for Small Businesses – What Should You Consider First?
Thinking of implementing AI in your business? With the ability to help companies to automate tasks, unlock insights and much more, it’s become a hot topic in recent years. Find out about considerations and first steps on the road to AI adoption here.
Full Article
right-chevron
grey-tick-icon
Trusted by 100s of businesses already
grey-tick-icon
Uniquely tailored approach
grey-tick-icon
Outstanding customer service
swift-tag

Talk with us

We pride ourselves on being an honest trustworthy business communications provider
phone-icon
Telephone
Call 03333 200 222 or if you would prefer us to call you.
Schedule a call
email-icon
Email
We love emails, to send us one use [email protected] or fill in our
Contact Form
chat-icon
Live Chat
Got a question? Our live chat is open and ready to assist
Chat Now
Contact a specialist
crosschevron-down