Statements (26)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cybersecurity deception technology
|
gptkbp:canBe |
gptkb:software
hardware system high-interaction low-interaction production honeypot research honeypot |
gptkbp:example |
gptkb:Dionaea
Glastopf Honeyd KFSensor |
gptkbp:firstDescribed |
1990s
|
https://www.w3.org/2000/01/rdf-schema#label |
Honey Pot
|
gptkbp:monitors |
malicious activity
|
gptkbp:notableCollection |
attack data
|
gptkbp:purpose |
detect unauthorized access
divert attackers study attacker behavior |
gptkbp:relatedTo |
network security
cyber threat intelligence intrusion prevention system |
gptkbp:requires |
careful deployment
|
gptkbp:riskFactor |
can be compromised
|
gptkbp:usedIn |
computer security
|
gptkbp:bfsParent |
gptkb:Beat_Happening_(album)
|
gptkbp:bfsLayer |
8
|