SlideShare a Scribd company logo
1 of 10
Download to read offline
HONEY POT
PRESENTER: Shishir
Tamang
WHAT IS HONEY POT
 Honey pot is an security mechanism which is used for monitoring,
detecting and analyzing attacks.
 Basically kept in a network which is not secure
 There are about two million honey pot around the world
Types of interaction
Low interaction High interaction
• Looks and acts like operating
system
• Easy to install
• Minimal risk
• Captures bit of information
• Real operating system with
services
• Complex to install and deploy
• Increased risk
• Captures lot of information
It is about weighing risk verse reward
HIGH INTERACTION HONEYNET
Information they gather
 How the attacker entered the system and from where
 What is being deleted or added
 Key strokes of the person typing
 What malware is being used
 IP addresses of attacker
Ethical Concerns
 Entrapment
 Privacy
 Liability
Best Practices
 Should be used with other security devices
 Banner at login screen
 Prevent all outgoing traffic from honey pot
 Have a blank command line
 Limit exposer of honeypot to rest of the network
Conclusion
 Using honeypot is all about risk
 Proper setup is key
 Simple steps helps reduce an illegal issue
 Follow best practices
Conclusion
 Using honeypot is all about risk
 Proper setup is key
 Simple steps helps reduce an illegal issue
 Follow best practices

More Related Content

What's hot

Uncover threats and protect your organization
Uncover threats and protect your organizationUncover threats and protect your organization
Uncover threats and protect your organizationRapidSSLOnline.com
 
11 signs you've been hacked -- and how to fight back
11 signs you've been hacked -- and how to fight back11 signs you've been hacked -- and how to fight back
11 signs you've been hacked -- and how to fight backnortonantivirusfreedownload
 
Review of Information Security Concepts
Review of Information Security ConceptsReview of Information Security Concepts
Review of Information Security Conceptsprimeteacher32
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecuritySophos Benelux
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - EndpointsWebinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - EndpointsStorage Switzerland
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseLumension
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention GuideBrian Honan
 
Building a Strategic Plan for Your Security Awareness Program
Building a Strategic Plan for Your  Security Awareness ProgramBuilding a Strategic Plan for Your  Security Awareness Program
Building a Strategic Plan for Your Security Awareness ProgramPriyanka Aash
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksJames Cash
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management ProgramTripwire
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 

What's hot (20)

Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheetCylance Ransomware-Remediation & Prevention Consulting Data-sheet
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
 
Uncover threats and protect your organization
Uncover threats and protect your organizationUncover threats and protect your organization
Uncover threats and protect your organization
 
Information security policy
Information security policyInformation security policy
Information security policy
 
11 signs you've been hacked -- and how to fight back
11 signs you've been hacked -- and how to fight back11 signs you've been hacked -- and how to fight back
11 signs you've been hacked -- and how to fight back
 
Review of Information Security Concepts
Review of Information Security ConceptsReview of Information Security Concepts
Review of Information Security Concepts
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
What's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized SecurityWhat's cooking at Sophos - an introduction to Synchronized Security
What's cooking at Sophos - an introduction to Synchronized Security
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Security tools
Security toolsSecurity tools
Security tools
 
4Shadow
4Shadow4Shadow
4Shadow
 
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - EndpointsWebinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Building a Strategic Plan for Your Security Awareness Program
Building a Strategic Plan for Your  Security Awareness ProgramBuilding a Strategic Plan for Your  Security Awareness Program
Building a Strategic Plan for Your Security Awareness Program
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber Attacks
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 

Viewers also liked

ZomBee Watch Tutorial
ZomBee Watch TutorialZomBee Watch Tutorial
ZomBee Watch Tutorialasimsfsu
 
The Action Presentation Class
The Action Presentation ClassThe Action Presentation Class
The Action Presentation ClassMiguel Lesy
 
Honey Is A Medicine
Honey Is A MedicineHoney Is A Medicine
Honey Is A Medicinekichu
 
Computing (cloude & grid) & honey pots
Computing (cloude & grid) & honey potsComputing (cloude & grid) & honey pots
Computing (cloude & grid) & honey potsVarun Sharma
 
Parrot
ParrotParrot
Parrotalhood
 
GVSU ED 205 Interactive Powerpoint Honeybees Final
GVSU ED 205 Interactive Powerpoint Honeybees FinalGVSU ED 205 Interactive Powerpoint Honeybees Final
GVSU ED 205 Interactive Powerpoint Honeybees Finalstacey.gillette
 
Eiffel Tower
Eiffel TowerEiffel Tower
Eiffel Towerpps 33
 
125th anniversary of the Eiffel Tower
125th anniversary of the Eiffel Tower125th anniversary of the Eiffel Tower
125th anniversary of the Eiffel Towerguimera
 
The Benefits Of Honey
The Benefits Of HoneyThe Benefits Of Honey
The Benefits Of Honeyrabubakar
 

Viewers also liked (20)

Honey Pot
Honey PotHoney Pot
Honey Pot
 
ZomBee Watch Tutorial
ZomBee Watch TutorialZomBee Watch Tutorial
ZomBee Watch Tutorial
 
The Action Presentation Class
The Action Presentation ClassThe Action Presentation Class
The Action Presentation Class
 
Honey Is A Medicine
Honey Is A MedicineHoney Is A Medicine
Honey Is A Medicine
 
Computing (cloude & grid) & honey pots
Computing (cloude & grid) & honey potsComputing (cloude & grid) & honey pots
Computing (cloude & grid) & honey pots
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Parrot
ParrotParrot
Parrot
 
Mars
MarsMars
Mars
 
GVSU ED 205 Interactive Powerpoint Honeybees Final
GVSU ED 205 Interactive Powerpoint Honeybees FinalGVSU ED 205 Interactive Powerpoint Honeybees Final
GVSU ED 205 Interactive Powerpoint Honeybees Final
 
4 planet Mars
4 planet Mars4 planet Mars
4 planet Mars
 
Client Side Honeypots
Client Side HoneypotsClient Side Honeypots
Client Side Honeypots
 
Haway
HawayHaway
Haway
 
Australia
Australia Australia
Australia
 
Eiffel Tower
Eiffel TowerEiffel Tower
Eiffel Tower
 
Magnetic tape
Magnetic tapeMagnetic tape
Magnetic tape
 
the SUN
the SUNthe SUN
the SUN
 
125th anniversary of the Eiffel Tower
125th anniversary of the Eiffel Tower125th anniversary of the Eiffel Tower
125th anniversary of the Eiffel Tower
 
The Benefits Of Honey
The Benefits Of HoneyThe Benefits Of Honey
The Benefits Of Honey
 
Blue neptune
Blue neptuneBlue neptune
Blue neptune
 
Eat green tea
Eat green teaEat green tea
Eat green tea
 

Similar to Honey pot (20)

Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honeypots.ppt
Honeypots.pptHoneypots.ppt
Honeypots.ppt
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 
HoneyPots.pptx
HoneyPots.pptxHoneyPots.pptx
HoneyPots.pptx
 
Honey pots
Honey potsHoney pots
Honey pots
 
IS-honeypot.pptx
IS-honeypot.pptxIS-honeypot.pptx
IS-honeypot.pptx
 
Dos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdfDos and Don’ts of Network Security.pdf
Dos and Don’ts of Network Security.pdf
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Honey pots
Honey potsHoney pots
Honey pots
 
Srikanth
SrikanthSrikanth
Srikanth
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Cyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdfCyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdf
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeynet architecture
Honeynet architectureHoneynet architecture
Honeynet architecture
 

Honey pot

  • 2. WHAT IS HONEY POT  Honey pot is an security mechanism which is used for monitoring, detecting and analyzing attacks.  Basically kept in a network which is not secure  There are about two million honey pot around the world
  • 3. Types of interaction Low interaction High interaction • Looks and acts like operating system • Easy to install • Minimal risk • Captures bit of information • Real operating system with services • Complex to install and deploy • Increased risk • Captures lot of information
  • 4. It is about weighing risk verse reward
  • 6. Information they gather  How the attacker entered the system and from where  What is being deleted or added  Key strokes of the person typing  What malware is being used  IP addresses of attacker
  • 7. Ethical Concerns  Entrapment  Privacy  Liability
  • 8. Best Practices  Should be used with other security devices  Banner at login screen  Prevent all outgoing traffic from honey pot  Have a blank command line  Limit exposer of honeypot to rest of the network
  • 9. Conclusion  Using honeypot is all about risk  Proper setup is key  Simple steps helps reduce an illegal issue  Follow best practices
  • 10. Conclusion  Using honeypot is all about risk  Proper setup is key  Simple steps helps reduce an illegal issue  Follow best practices