Please note that this is a page from a previous version of Continuity Central and is no longer being updated.

To see the latest business continuity news, jobs and information click here.

Business continuity information

Combatting cyber-attacks with honeypots

In a new guidance document, ‘Proactive detection of security incidents II,’ ENISA, the EU security agency, describes 30 different ‘digital traps’ or honeypots that can be used by computer emergency response teams (CERTs) to proactively detect cyber-attacks. The study reveals barriers to understanding basic honeypot concepts and presents recommendations on which honeypot to use.

Honeypots are traps with the sole task of luring in attackers by mimicking a real computing resource (e.g. a service, application, system, or data). Any entity connecting to a honeypot is deemed suspicious, and all activity is monitored to detect malicious activity.

This study is a follow-up to a recent ENISA report on Proactive Detection of Network Security Incidents. The previous report concluded that while honeypots were recognised by CERTs as providing crucial insight into hacker behaviour, their usage to detect and investigate attacks was still not as widespread as might be expected. This implied barriers to their deployment.

This new study presents practical deployment strategies and critical issues for CERTs.

Read the report.

•Date: 23rd Nov 2012 • Europe/UK •Type: Article • Topic: ISM

Business Continuity Newsletter Sign up for Continuity Briefing, our weekly roundup of business continuity news. For news as it happens, subscribe to Continuity Central on Twitter.

How to advertise How to advertise on Continuity Central.

To submit news stories to Continuity Central, e-mail the editor.

Want an RSS newsfeed for your website? Click here