In computer security, honeypots, like their real-world counterparts employed by law enforcement agencies, are traps set to detect or counteract authorized access to computer networks. Honeypots can take the form of individual computers, data sets, or network sites that appear to be valuable or worth investigating to the intruding party but which are actually designed to entrap and/or monitor the attacker.
Honeypots are typically divided into two primary categories: production honeypots and research honeypots. Production honeypots are traps laid by actual entities seeking to protect assets (such as a government agency or corporation) where as research honeypots are designed to monitor and study the hackers that stumble into the trap.
- By Jason Fitzpatrick on 11/7/13