{"id":33255,"date":"2021-05-06T12:34:38","date_gmt":"2021-05-06T10:34:38","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=33255"},"modified":"2021-05-06T13:09:12","modified_gmt":"2021-05-06T11:09:12","slug":"honeypot-a-trap-for-hackers","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/honeypot-a-trap-for-hackers\/","title":{"rendered":"Honeypot, a trap for hackers"},"content":{"rendered":"<p>One of the pillars of a good<strong> cybersecurity <\/strong>In a company it begins by having a <strong>good computer network.<\/strong> If any of the components within it<strong> does not work well or is violated <\/strong>due to internal or external threats,<strong> we put at risk <\/strong>the entire system and we are defenseless against any attack.<\/p>\n\n\n\n<p>The <strong>cybersecurity<\/strong> within a company it is very important to safeguard its information, with the <a href=\"https:\/\/eiposgrados.com\/eng\/master-in-cybersecurity\/\" class=\"rank-math-link\">Master in Cybersecurity Management, Ethical Hacking and Offensive Security<\/a>  in <a href=\"https:\/\/eiposgrados.com\/eng\/\" class=\"rank-math-link\">EIP<\/a> You will train to be a professional in this field. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Honeypot?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/honeypot.jpg\" alt=\"Honeypot a trap for hackers\" class=\"wp-image-33266\" width=\"251\" height=\"493\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/honeypot.jpg 323w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/honeypot-153x300.jpg 153w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/05\/honeypot-84x165.jpg 84w\" sizes=\"(max-width: 251px) 100vw, 251px\" \/><\/figure><\/div>\n\n\n\n<p>One of the elements that make our network more secure is the <strong>honeypot<\/strong>, since it works as a <strong>early warning system against attacks.<\/strong><\/p>\n\n\n\n<p>With this very nice name is how this one is known.<strong> protection system<\/strong> whose function is to imitate the possible targets of cyber attacks.&nbsp;<\/p>\n\n\n\n<p>The Honeypot is a <strong>technique or tool to know the enemy<\/strong>, since it is a <strong>\u201ctrap system\u201d <\/strong>located on the network, whose main function is to detect and obtain all the information about the cyber attack and how the<strong> cybercriminals.&nbsp;<\/strong><\/p>\n\n\n\n<p>They have existed for decades but are becoming more sophisticated.<\/p>\n\n\n\n<p>Continuing with the culinary simile (honeypot, literally means honey pot), we can imagine this technique as a <strong>mouse trap with cheese<\/strong>, so that cyber attackers are attracted to the \u201ccheese\u201d which we can say is the information they want and the <strong>HoneyPot is the trap where the cheese is.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How do Honeypots work?<\/h2>\n\n\n\n<p>If, for example, we worked in a <strong>insurance company<\/strong>, we would set up a Honeypot system so that the <strong>Cybercriminals believe they are within our network<\/strong>, with fictitious data, files and everything imaginable to make it real.<\/p>\n\n\n\n<p>We can monitor traffic to this system to better understand cybercriminals, how they attack and what they are looking for above all and in order to determine what <strong>security measures we have to implement <\/strong>to avoid succumbing to these attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Honeypot Types<\/h2>\n\n\n\n<p>We can classify the <strong>types of honeypots<\/strong> according to the degree of <strong>interaction with the cyber attacker<\/strong>, so we can differentiate them as low or high interaction Honeypot.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Low interaction<\/strong>. Your interaction with the cyber attacker is<strong> almost zero <\/strong>and its function is to<strong> imitate applications, systems or equipment on the network<\/strong>. With this simulation we manage to obtain information about the attacker.<\/li><li><strong>High interaction.<\/strong> This type of honeypot typically consists of<strong> teams with identical real systems<\/strong> to those that the servers they imitate would have. They are computers that operate on a real network with real systems. A high interaction honeypot should be <strong>fully protected<\/strong> Since, if not, the cybercriminal can infiltrate our local network and achieve their main objective, accessing our systems.<\/li><\/ul>\n\n\n\n<p>The HoneyPots<strong> They can be very useful<\/strong> to know<strong> What type of cybercriminal wants to attack us?<\/strong>, the Honeypot must be well configured and have succulent information, not real of course, so that the cybercriminal shows his weapons and we can thus<strong>to protect us from their attacks <\/strong>in our real system.<\/p>","protected":false},"excerpt":{"rendered":"<p>We show you Honeypot, a trap for hackers. For the cybersecurity of your company, it is very interesting and important. We tell you everything!<\/p>","protected":false},"author":51,"featured_media":33269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-33255","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/33255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=33255"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/33255\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/33269"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=33255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=33255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=33255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}