This document compares different types of honeypot systems. It discusses low, medium, and high interaction honeypots. Low interaction honeypots are easiest to install but provide limited information on attackers. High interaction honeypots deploy real operating systems and applications and provide the most detailed attacker information but are also highest risk and hardest to manage. The document analyzes the tradeoffs between honeypot interaction levels in terms of effort, information gathered, and security risks.