TrainACE - IT and Cybersecurity Training Blog

How Honey Pots and Honey Farming is Used in Cyber Security

[fa icon="calendar'] Jan 29, 2013 3:45:21 AM / by Ryan Corey posted in advanced persistent threat, Cisco, Cybersecurity, Exploits, Information Assurance

[fa icon="comment"] 0 Comments


The term “honeypot” or, as it sometimes appears, “honey pot,” came to computer security from the world of espionage, where it referred to an agent who would be sexually available to a target. If all went as planned, the target would be compromised, either by sexual blackmail or because the relationship led the target to share secret information.

Read More [fa icon="long-arrow-right"]

Need IT Certifications?
Want more info?

Call (301) 220-2802

Speak with a Program Manager