What is a Honeypot?

Поделиться
HTML-код
  • Опубликовано: 19 апр 2020
  • Honeypots are an effective security measure that can be used to detect lateral movement and potential bad actors on your network. Blumira makes it easy to deploy and manage honeypots with low effort, allowing for early detection of attacks and threats. Learn more at www.blumira.com.
  • НаукаНаука

Комментарии • 11

  • @maherhashem2135
    @maherhashem2135 29 дней назад

    Would you allow me to use your video for my graduation project, mentioning the name of your channel?

  • @sup_homie
    @sup_homie 6 месяцев назад

    kudos to your animation

  • @azhagurajaallinall126
    @azhagurajaallinall126 2 года назад +1

    Just subbed 👍

  • @jkk4579
    @jkk4579 2 года назад +2

    Lovely simply explained

  • @arjumandvillagecooking
    @arjumandvillagecooking 2 года назад +1

    Great 🥰🥰❤

  • @thenightstreamer4702
    @thenightstreamer4702 Год назад +2

    So are attackers getting into the actual network through a honeypot or is an isolated from the real network? Are attackers getting real information or falsified information that appears to be real?

    • @odinakaprecioussamuel5518
      @odinakaprecioussamuel5518 Год назад +6

      In a Virtual Honeypot System, attackers are diverted away from the actual network into a simulated environment where they can interact with the simulated hosts and applications. The simulated environment is typically isolated from the real network to prevent attackers from accessing real information or compromising actual devices. The simulated environment is designed to appear real and believable to attackers to increase the likelihood of attracting them. The simulated hosts and applications in the honeypot environment may contain known vulnerabilities and weaknesses that attackers can exploit, and the honeypot system can log the attacker's actions for analysis and learning.
      Therefore, attackers are not getting into the actual network through a honeypot. Instead, they are lured into a simulated environment where their actions can be monitored, and the information gathered can be used to improve the security of the actual network.

  • @Hariharan.K.03
    @Hariharan.K.03 2 года назад +4

    I have a doubt ....how honey pot find and differ that's.... normal user and hacker

  • @eivaneidetorres2332
    @eivaneidetorres2332 2 года назад +1

    3222

  • @mdmehedi4432
    @mdmehedi4432 2 года назад +1

    wosom

  • @hanumanthraohanumanthrao7647
    @hanumanthraohanumanthrao7647 Год назад

    No i am not asked myself ,my logical less engineering college is asking