A 605-page NSA document from 2004 reads like a listing of the pros and cons for a
huge array of defensive and counterintelligence approaches and
technologies that an entity might adopt in defending its networks. There is a key section on deception technologies that discusses the use of honeynet technology to learn more about
attackers’ methods, as well as the potential legal and privacy aspects
of using honeynets. Read the full article. [KrebsonSecurity]
NSA Document Sheds Light on Honeynets
Author:
Donald Sears
minute read
Share this article:
A 605-page NSA document from 2004 reads like a listing of the pros and cons for a
huge array of defensive and counterintelligence approaches and
technologies that an entity might adopt in defending its networks. There is a key section on deception technologies that discusses the use of honeynet technology to learn more about
attackers’ methods, as well as the potential legal and privacy aspects
of using honeynets. Read the full article. [KrebsonSecurity]