Honeypots are frequently used by security specialists or researchers to gather information about current threats and attacks.
There are many different types of honeypots. Some consist of machines connected to the network that are used to capture malware. Others provide fake network services (e.g., a web server) in order to log incoming attacks.
Back to Security Threats A-Z
Back to Threatsaurus Home