Honeypots for Windows (Books for Professionals by Professionals)

skip navigation

Chapter 1 - An Introduction to Honeypots
Honeypots for Windows
by Roger A. Grimes
Apress 2005

As much as I like honeypots, I still need to point out some trade-offs and risks involved in their use. First, a honeypot means hours of setup, maintenance, and analysis. In your busy life as a computer administrator, are you ready to add even more hours of work? If you’re already overworked and you cannot fit in any extra hours or put some other tasks aside, forget about honeypots. They aren’t “install and forget it” systems. They take care and feeding. If neglected, they can actually increase your company’s exposure and legal risk.

Putting up a system designed to be compromised by unauthorized outsiders entails a certain amount of risk that you would otherwise not have. The key is to be a conscientious honeypot administrator, practice strict data control, and keep on top of the data the honeypot is producing. If the honeypot is compromised, follow up immediately or take the system offline. The worst thing you can do is to neglect the honeypot and let it sit unmonitored. The hacker might be using it to hack other computers inside and outside your network.

Caution 

Please seek professional legal advice before deploying a honeypot. The statements in this section are only my opinions.

Many papers on the Internet discuss the legal risks of running a honeypot. Discussion centers on liability, privacy, and entrapment. Privacy issues, such as intercepting innocent third-party communications without consent, seem to worry legal analysts the most. One of the best papers on the subject, “Honeypots: Are They Illegal?,” by Lance Spitzner, is located at http://www.securityfocus.com/infocus/1703. The short answer is that laws that could apply to honeypot surveillance technology have not yet been tested in the courts. Most researchers believe that although hackers may be able to defend themselves using some of the laws, it is probably unlikely that anyone will be charged for running a honeypot that is then abused by others.

You can reduce your legal risk when using a honeypot by following these guidelines:

Most honeypot experts believe these suggestions will significantly reduce any legal risk, but you should always consult legal counsel before deploying a honeypot.

HONEYPOT INFORMATION RESOURCES

The following are a few helpful honeypot resources:

Категории