Find a Question:
KPN uses this first year ‘honeypots’ in security research
KPN will self deploy honeypots to lure Internet criminals. The systems are primarily used to collect information about how criminals go to work and to adapt the security of our systems accordingly.
Honeypots are mostly used by security, but Jaya Baloo, chief information security officer at KPN, explains that her company is also familiar with it will remain the techniques of attackers. “If we know how and why criminals and hackers to penetrate our systems, we can take action.” She emphasizes that KPN systems only committed to gathering information, not for detection.
Honeypots look like the vulnerable systems where cybercriminals seeking. The operation of the honeypots and the way they are going to be used by KPN, are described in the report European Cyber Security Perspectives 2015 . The report is the result of a collaboration between the National Police, TNO, the National Cyber Security Centre of the Ministry Security and Justice and KPN.
KPN deploys various honeypots in. So it goes among other things, with a low interaction honeypots, or systems that are interesting enough to look away to still closer look. Such a system is similar to a nepfiets; a thief will walk there and closer note that it is not a real bike. Known as who might be interested in vulnerable systems. The next level is slightly more interaction to find out who really hurt. The highest level gives much interaction, so known is what the criminal really wants to join.
In a message on the site of KPN a security is another example of a find described in the report: the global vulnerability in the GPRS Roaming Exchange network GRX. It appears that the mandatory closed mobile networks of various providers are a lot less closed than it should. Thus, inter alia to find out where a phone is located.Viewing:-185
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!