Honeypots: Tracking Hackers. (Reviews).
Sting operations can have monumental consequences. Who can forget the FBI agent dressing up as a sheik and trying to purchase political favor in Abscam, or Marion Barry taking a drag on a crack pipe in a Washington, D.C., hotel room? Stings are also important tools in the digital world, with the honeypot serving as the lure.
A honeypot is generally a file server, router, or Web server set out to attract hackers and enable investigators to track their moves. Honeypots allow businesses to see who their attackers are and how they operate, and this book performs that task well.
After a brief introduction, author Lance Spitzner, a luminary in the field, details various commercial and open-source honeypots, discussing pros and cons. He makes clear that honeypots are not for everyone, because maintenance can be intricate and time consuming.
Even for those with no intention of deploying a honeypot, however, this book teems with information about attackers and their methods. It would make a fine complement to Spitzner's Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhar Community (reviewed in June 2002).
Ben Rothke, CISSP (Certified Information Systems Security Professional), is a computer security consultant in the New York metropolitan area. He is a member of ASIS.
|Printer friendly Cite/link Email Feedback|
|Article Type:||Book Review|
|Date:||Feb 1, 2003|
|Previous Article:||Before Conflict: Preventing Aggressive Behavior. (Reviews).|
|Next Article:||Bioterrorism and Public Health: An Internet Resource Guide. (Reviews).|