Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Honeypots 2.0 - A New Twist on Defending Enterprise Networks

Security BSides San Francisco via YouTube

Overview

Explore the evolution of honeypots and dynamic deception techniques in enterprise network defense through this BSidesSF 2018 conference talk. Delve into the concept of "Honeypots 2.0" and learn how modern technologies like virtualization, cloud computing, containers, and DevOps tool chains enable scaling honeypots for greater impact in large-scale enterprise networks. Discover the potential of the Python-based Twisted networking framework for developing advanced honeypot technologies. Gain insights into honeypot essentials, scaling strategies, and the implementation of dynamic deception at scale. Examine practical examples, including Modbus and dynamic implementations, with less than 20 lines of code. Understand the relevance of these techniques in defending against insider threats and securing Industrial Internet of Things (IIoT) environments.

Syllabus

Introduction
Industrial Internet of Things
Digital Twin
Cyber Security
Dynamic Deception
Types of Deception
Signal Injection
What is a Honeypot
Goals of Honeypots
Insider Threat
Python Implementation
Output
Code Complexity
Twisted
Twisted Example
Lesson 19 Less Than 20 Lines of Code
Lesson 19 Dynamic Example
Modbus Example
Scaling
Conclusion

Taught by

Security BSides San Francisco

Reviews

Start your review of Honeypots 2.0 - A New Twist on Defending Enterprise Networks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.