References
- Fruhlinger, J. (2019, April 01). What is a honeypot? A trap for catching hackers in the act. Retrieved November 7, 2020, from https://www.csoonline.com/article/3384702/what-is-a-honeypot-a-trap-for-catching-hackers-in-the-act.htm
- Honeypot (computing). (2020, November 13). Retrieved November 11, 2020, from https://en.wikipedia.org/wiki/Honeypot_(computing)
- Arora, M., & CatchUpdatesHi, F. M. (2020, September 05). What Are Honeypots? Various Types Of HoneyPots. Retrieved November 8, 2020, from https://catchupdates.com/honeypots/
- "A Honeypot For Assholes": Inside Twitter's 10-Year Failure To Stop Harassment. (n.d.). Retrieved November 13, 2020, from https://ontdpolitical.livejournal.com/11567255.html
- Livshitz, I. (2020, January 05). Low, Medium and High Interaction Honeypot Security. Retrieved November 10, 2020, from https://www.guardicore.com/2019/1/high-interaction-honeypot-versus-low-interaction-honeypot/
- Honeypots For Network Security Information Technology Essay - Free Essay Example by Essaylead. (2017, July 15). Retrieved November 11, 2020, from https://essaylead.com/honeypots-for-network-security-information-technology-essay-1428/
- Benefits of Honeypots - There's More to Honeypots Than Wasting Hackers' Time. (2018, August 22). Retrieved November 11, 2020, from https://www.webtitan.com/blog/honeypots-how-far-can-you-go-in-wasting-a-hackers-time/
- Skoudis, E. (2008, January 04). What security risks do enterprise honeypots pose? Retrieved October 13, 2020, from https://searchsecurity.techtarget.com/answer/What-security-risks-do-enterprise-honeypots-pose
- Honeypot (computing). (2020, November 13). Retrieved November 15, 2020, from https://en.wikipedia.org/wiki/Honeypot_(computing)
- How To Establish a Honeypot on Your Network - Step by Step. (2020, September 29). Retrieved November 13, 2020, from https://www.comparitech.com/net-admin/how-to-establish-a-honeypot-on-your-network/
- NG, C. K., Pan, L., & Xiang, Y. (2018). Honeypot Frameworks and Their Applications: A New Framework. Singapore: Springer Singapore.
- PentBox Tutorial (A Penetration Testing Tool). (n.d.). Retrieved November 17, 2020, from https://www.hackingarticles.in/pentbox-tutorial-a-penetration-testing-tool/
- Kaspersky. (2020, September 10). What is a honeypot? Retrieved November 6, 2020, from https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot
- Toolsmith: HoneyDrive - Honeypots in a Box. (2014, October 03). Retrieved November 18, 2020, from https://holisticinfosec.blogspot.com/2014/10/toolsmith-honeydrive-honeypots-in-box.html
- -, R., By, -, Ranjithhttp://kalilinuxtutorials.comA nonchalant person with a dexterity for writing and working as a Engineer., Ranjith, A nonchalant
- person with a dexterity for writing and working as a Engineer., ... -, B. N. (2019, June 19). Kippo - SSH Honeypot To Log Brute Force Attacks. Retrieved November 19, 2020, from https://kalilinuxtutorials.com/kippo-honeypot-brute-force-attacks/
- Download HoneyDrive 3. (2014, July 29). Retrieved November 10, 2020, from https://linux.softpedia.com/get/System/Operating-Systems/Linux-Distributions/HoneyDrive-102674.shtml
- Arora, M., & CatchUpdatesHi, F. M. (2020, September 05). What Are Honeypots? Various Types Of HoneyPots. Retrieved November 11, 2020, from https://catchupdates.com/honeypots/
- Tripwire Guest AuthorsDec 29, 2. S. (2019, December 17). Honeypots: A Guide To Increasing Security. Retrieved November 20, 2020, from https://www.tripwire.com/state-of-security/security-data-protection/honeypots-guideincreasing-security/
- Kaspersky. (2020, September 10). What is a honeypot? Retrieved November 20, 2020, from https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot