n
Production Honeypot
n
Protect productive network
n
Commercial product
Commercial product
n
Simple, easy to build and deploy
Simple, easy to build and deploy
n
Small dangerous
Small dangerous
n
Small information
Small information
Protect productive network
n
Commercial product
Commercial product
n
Simple, easy to build and deploy
Simple, easy to build and deploy
n
Small dangerous
Small dangerous
n
Small information
Small information
n
Research Honeypot
n
Get hacker information
n
Indirect help security experts to protect resources
Indirect help security experts to protect resources
n
Real system and service
Real system and service
n
Complex, difficult to build and deploy
Complex, difficult to build and deploy
n
High hazardous
High hazardous
n
The amount of information is relatively large
The amount of information is relatively large
Get hacker information
n
Indirect help security experts to protect resources
Indirect help security experts to protect resources
n
Real system and service
Real system and service
n
Complex, difficult to build and deploy
Complex, difficult to build and deploy
n
High hazardous
High hazardous
n
The amount of information is relatively large
The amount of information is relatively large
n
Research Honeypot
n
Get hacker information
n
Indirect help security experts to protect resources
Indirect help security experts to protect resources
n
Real system and service
Real system and service
n
Complex, difficult to build and deploy
Complex, difficult to build and deploy
n
High hazardous
High hazardous
n
The amount of information is relatively large
The amount of information is relatively large
Get hacker information
n
Indirect help security experts to protect resources
Indirect help security experts to protect resources
n
Real system and service
Real system and service
n
Complex, difficult to build and deploy
Complex, difficult to build and deploy
n
High hazardous
High hazardous
n
The amount of information is relatively large
The amount of information is relatively large