A computer or network that is intentially left with common vulnerabilities that a hacker would use to hack the system. There are two reasons why people use honeypots. The first reason is for research to see what types of exploits hackers are currently trying to use. The second reason is for a system administrator of a network or computer to see how hackers are targetting his network, and therefore the system administrator knows what security measures need to be focused on in order to better protect the network or computer. The system administrator can also draw off potential hackers to their more important computers to a "supposed" easier computer, the Honeypot, to hack.
|