What is a Honeypot
A free video tutorial from Alton Hardin
Educator. Author. Poker Coach. IT & Business Professional.
4.6 instructor rating • 16 courses • 79,275 students
Learn more from the full courseMTA 98-367 Security Fundamentals Class & Exam Prep Bundle
Everything you need to pass the Microsoft MTA 98-367 exam on your 1st attempt, includes 2 full-length practice exams!
16:42:44 of on-demand video • Updated March 2021
- This is a complete and comprehensive Microsoft MTA 98-367 Security Fundamentals Certification course and practice exams bundle. It’s designed to prepare you to be able to take and pass the certification exam needed to become Microsoft MTA 98-367 Certified.
- Once you complete the course, you’ll have the knowledge and confidence to pass the Microsoft MTA 98-367 Security Fundamentals Certification exam AND the skills to begin working as an IT professional. This course is ideal as both a study tool and an on-the-job reference.
- Your new skills and the Microsoft MTA 98-367 Certified will help you land an IT tech job or if you’re already working in IT, get a raise or advance in your career.
English [Auto] In this video, we're going to talk about honeypots, so what is a honeypot? Well, here's a diagram of a honey pot. What it is, is that a honey pot as a decoy server or multiple servers. And they're typically placed in a DMZ, which we see down here. We have our firewall. We have our DMZ over here with a honey pot in it, and then our internal network protected on a different interface on the firewall. And the whole purpose of these honeypots, being in a DMZ is they're designed to entice malicious users, meaning hackers, to attack them rather than our internal network. And so how does this work? Well, they're set up to look just like live production servers. However, the I.T. personnel are going to poorly configure them to make them much easier to exploit than our actual production servers. So the more enticing to attack, they're easier to get into. They're easier to exploit. So why do we use a honeypot? Well, they serve a twofold purpose. The first one, of course, makes sense. And it's kind of straightforward as a lure that the hackers away from our real network. So we would much rather have them attack our honeypot than our real production internal network. The second thing is that honeypots allow our IT personnel to observe and learn how hackers are attacking our system. So we get to learn their methodologies for how they're exploiting weaknesses and vulnerabilities within our systems so we can better secure them. So that's a honeypot. And like I said, they're typically set up within a DMZ. Could be an actual physical server. There could be multiple servers. They could be multiple servers that are fertilized within a single physical server. The way in which they're set up is really just going to be dependent upon the organization. But like I said, they're typically set up in their own DMZ, off on a different interface on our firewall mean in regards to the role that they play in network isolation, will they play a role in isolating or at least enticing the attackers to their own isolated portion of the network rather than our internal network? So that's going to conclude our short introduction and overview into honeypots. So if you have any questions, please let me know. If not, thanks for watching and I'll see you at the next video.