Artwork
iconShare
 
Manage episode 503751953 series 3332029
Content provided by W. Curtis Preston (Mr. Backup). All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by W. Curtis Preston (Mr. Backup) or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Learn the ins and outs of honeypot server deployment and management in this episode of The Backup Wrap-up. We break down the cybersecurity concept using examples from Mr. Robot episodes 1.6 and 1.7, showing how these deceptive systems can catch both external attackers and insider threats.

A honeypot server works by creating an enticing target that looks valuable but contains no real business data. The key is making it accessible through common exploits and monitoring every access attempt. Curtis and Prasanna discuss real-world implementation strategies, from naming conventions to network placement, and explain why the honeypot only works if attackers don't know it exists. They also cover the critical importance of remote log storage for forensic analysis and how these systems can reveal attack patterns and entry points during incident response.

  continue reading

322 episodes