Honeypots are decoy system that are placed in infrastructure to attract and deflect attackers. Honeypots simulate and look like real system having applications and services running on it with vulnerabilities intentionally being kept open which makes it as a trap and lures the attackers towards it. Honeynet is collections of Honeypots. Types of Honeypots Production…
Category: Security Operations
Vulnerability
A vulnerability is a weakness in a system, network or software/application that can be exploited to cause impact like bringing service down, data exfiltration or un-authorized access. The vulnerability can be due to the following reasons: