Home > Articles > Security > General Security and Privacy

  • Print
  • + Share This
This chapter is from the book


Honeynets are a tool to learn—specifically, the tools, tactics, and motives of the blackhat community. What makes a Honeynet unique is the fact that nothing is emulated. Instead, a highly controlled network is made up of machines running operating systems and applications identical to production systems. Once compromised, the systems not only teach us how the blackhat community operates but also identify risks and vulnerabilities that exist in our own environment. This is the primary value of the Honeynet: learning. Now, let's discuss how a Honeynet works.

  • + Share This
  • 🔖 Save To Your Account