• Call: (301) 220 2802
  • Email: info@trainace.com

TrainACE - IT and Cybersecurity Training Blog

How Honey Pots and Honey Farming is Used in Cyber Security

[fa icon="calendar'] Jan 29, 2013 3:45:21 AM / by Ryan Corey posted in advanced persistent threat, Cisco, Cybersecurity, Exploits, Information Assurance

[fa icon="comment"] 0 Comments

 

The term “honeypot” or, as it sometimes appears, “honey pot,” came to computer security from the world of espionage, where it referred to an agent who would be sexually available to a target. If all went as planned, the target would be compromised, either by sexual blackmail or because the relationship led the target to share secret information.

Read More [fa icon="long-arrow-right"]