"We've been hacked!" is an information technology manager's nightmare. Hackers break into computer systems for fun, profit and simply to prove--to themselves or to others--that they can. They make use of other people's computing resources and may use convoluted connections to cover their identities for nefarious purposes. Companies fear hackers because of the damage they can do to systems; the public generally fears hackers because of the viruses that are released through hacking activities, or because hackers can wreak havoc on the Internet. Ever since Clifford Stoll documented the tracking of a hacker who used complex connections over what are now considered quaint computer systems to seek military information, efforts have been underway to protect computer systems against hackers. Even casual computer users and owners are familiar with the term "firewall," a term that is used to refer to computer protection more than the structural device used to protect buildings. Honeypots were developed to help identify hackers while protecting the systems on which the honeypots are placed. Business and government information technology managers are interested in honeypot deployment, but there are compelling arguments against their use. This research examines the background of hacking and the hacking community, how honeypots work, and the benefits and the drawbacks of honeypots.
Standalone computers that have no interface to any other systems are not vulnerable to hackers--there is no way for anyone to gain access to the system from a remote location. However, advances in telecommunications made it possible for anyone with a phone line to connect to nearly any other computer that was also connected to a phone line. As telecommunication technology continued to improve, wireless networks became standard so that it is now possible for individuals to roam areas and scan for available--and vulnerable--networks (Fikes 1). The only way to ...