Printer Friendly

Honeypots: Tracking Hackers. (Reviews).

Honeypots: Tracking Hackers. By Lance Spitzner; published by Addison-Wesley, 800/282-0693 (phone), 515/284-2607 (fax); 480 pages; $4049.

Sting operations can have monumental consequences. Who can forget the FBI agent dressing up as a sheik and trying to purchase political favor in Abscam, or Marion Barry taking a drag on a crack pipe in a Washington, D.C., hotel room? Stings are also important tools in the digital world, with the honeypot serving as the lure.

A honeypot is generally a file server, router, or Web server set out to attract hackers and enable investigators to track their moves. Honeypots allow businesses to see who their attackers are and how they operate, and this book performs that task well.

After a brief introduction, author Lance Spitzner, a luminary in the field, details various commercial and open-source honeypots, discussing pros and cons. He makes clear that honeypots are not for everyone, because maintenance can be intricate and time consuming.

Even for those with no intention of deploying a honeypot, however, this book teems with information about attackers and their methods. It would make a fine complement to Spitzner's Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhar Community (reviewed in June 2002).

Ben Rothke, CISSP (Certified Information Systems Security Professional), is a computer security consultant in the New York metropolitan area. He is a member of ASIS.
COPYRIGHT 2003 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2003 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Rothke, Ben
Publication:Security Management
Article Type:Book Review
Date:Feb 1, 2003
Previous Article:Before Conflict: Preventing Aggressive Behavior. (Reviews).
Next Article:Bioterrorism and Public Health: An Internet Resource Guide. (Reviews).

Related Articles
Counterespionage for networks: now network managers can use hackers' own reconnaissance activities against them. (The Bottom Line).
Honeypots: the trap is set. (Database And Network Intelligence).
A sweet solution: honeypots distract hackers from valuable networks. (Internet).
Honeypots: a sticky legal landscape?
"Security warrior".
Latest 'dirty dozen' spam producing countries.
Snort cookbook.
Honeypots for Windows.
SophosLabs maps malware and spam with Google Earth.

Terms of use | Privacy policy | Copyright © 2018 Farlex, Inc. | Feedback | For webmasters