Honey Pots and Traps
- Set up fake "vulnerable" services to lure intruders into honey pots.
- Configure legitimate services with fake headers and traps to trigger alarms when attacked.
- Trap routine, but unused, services to provide early warning alarms.
- Large networks can dedicate entire systems to honey pot services and traps.
No notes for slide 25