Assignment 1:3 – Definition of honeypot

Introduction:

The objective of Assignment 1:3 is to gain insight in differentiating between the levels of details of definitions and selecting the right level of detail for a definition depending on the situation. Furthermore, by practicing in defining a technical term to readers from a non-technical audience, we gain understanding of how audience and purpose indicate the need for definition. This assignment will allow us to learn to appreciate the importance and role of definitions in technical writing. The term I have chosen is honeypot and the scenario will be a university professor teaching high school students about network security.

Term: Honeypot

Parenthetical definition:

A honeypot (a trap) is computer security system used to lure hackers into attacking it.

Sentence definition:

A honeypot is a computer security system designed to attract, detect and deflect hackers that attempt to hack it.

Expanded definition:

Etymology:

The term honeypot originates from the analogy where a bear is distracted by honey put as bait by hunters (Spacey, 2017).

History:

The term honeypot was first used to label a spying technique in the Cold War (Joshi & Sardana, 2011). However, in the technology world, the term honeypot was first used in Clifford Stoll’s “The Cuckoos Egg” and Bill Chewick’s “An evening with Breford” in 1991 (Joshi et al., 2011). The two publications describe how hackers were caught using honeypots.  In 1997, the first honeypot system, “The Deceptive Toolkit” developed by Fred Cohen, was released (Joshi et al., 2011). The toolkit intentionally had many vulnerabilities to trap hackers that were attracted to it (Ng, Pan & Xiang, 2018). It is now deemed the original and landmark of honeypots (Joshi et al., 2011). In 1998, the first commercial for a honeypot system, CyberCop sting3 was promoted (Joshi et al., 2011). With the introduction of honeypots in commercials, honeypots began to garner much attention. In 2002, the Honeynet Research Alliance was founded and composed of people around the globe sharing their honeypot research (Joshi et al., 2011). This allowed for honeypots to be used around the globe. Although honeypots are used to lure and trap hackers, they were intentionally made for educational purposes where they could analyze the attacking methods of hackers (Ng et al., 2018).

Required Conditions:

In order for a system to be called a honeypot, the system must intentionally contain vulnerabilities. However, the vulnerabilities cannot be too obvious or contain too many of them or hackers will not attack it.

Operating Principles:

The key principle when designing a honeypot is to consider the nature and purpose of the honeypot. Depending on the purpose of the honeypot, the honeypot can either be passive or aggressive towards hackers. Normally, honeypots that are used for protecting the server will be passive and honeypots that are used for research are more aggressive in nature where it is actively searching for an attack (Ng et al., 2018).

 

Figure 1 Honeynet

In Figure 1, the attacker is being redirected from one honeypot to another because it fell into the trap of a honey net which is a group of honeypots.

Works Cited:

Joshi, R. C., Sardana, A. (2011). Honeypots: A new paradigm to information security (1st ed.). Enfield, N.H: Science Publishers. doi:10.1201/b10738

NG, C. K., Pan, L., Xiang, Y. (2018).  framework (1st 2018 ed.). Singapore: Springer Singapore. doi:10.1007/978-981-10-7739-5

Peter, E. & Schiller, T. (2008). A Practical Guide to Honeypots. Retrieved 2019, Sep 23, from https://www.cse.wustl.edu/~jain/cse571-09/ftp/honey/

Spacey, J. (2017, March 8). 11 Examples of a Honeypot. Retrieved 2019, Sep 23, from https://simplicable.com/new/honeypot

Leave a Reply

Your email address will not be published. Required fields are marked *

*