Deploying Honeypots: A comprehensive report

Honeypots and honeynets – systems and networks set up specifically to attract hackers and attackers – can be important tools for Computer Emergency Response Teams (CERTs), helping them to identify and track malicious activity and “know thine enemy” by providing insight into attackers’ methods and tactics. But honeypot deployment is not without risks. The European Network and Information Security Agency (ENISA) recently released a very comprehensive (180+ page) report based on their evaluation and testing of thirty different standalone honeypots, which details deployment strategies and explores associated issues. You can download it in PDF format here:

Leave a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top