07 Jul HoneyPots
T-POT is an aggregation of many honeypots and other miscellaneous tools into one image. Through the use of Docker containers, they have been able to aggregate up to 16 separate honeypots to create an amazing all-in-one solution for deception-based detection.
Navigate to and take a look at all of the honeypots and tools that are aggregated into this distribution. Give a read to the rest of the document as it outlines many of the requirements, features, functions, and benefits of their platform.
Your task is to write me a minimum of 800 words that covers:
- Your general understanding of what a honeypot is. I don’t want a definition, I want to know your opinion on the value of a honeypot and if you see where that line is drawn for you on the value vs risk proposition. And it’s okay to think they’re not worth it.). Remember our goal in security is to secure and maintain the CIA triad… Honeypots don’t directly apply to that end in all cases.
- Specifics of the purpose and usage of one of the honeypots (doesn’t have to be in this image, if you have another one in mind). For instance, ADBHoney is a honeypot designed to detect unwanted Android Debugging traffic.
- How you’d use the honeypot you’ve chosen in any environment (your choice) and what would be the benefits to that addition?
- What would have to be configured or changed in other systems to allow the honeypot to function? For instance, if your installing a web-based honeypot then you’d need to forward requests through a reverse proxy to share port 80 traffic on your public IP, register a Domain or sub-domain to point to the honeypot, etc..
Please cite and use references in apa 7th edition format.
