IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. (This includes the hacker, cracker, and script kiddy.) To set up a honey pot, it is recommended that you:Install the operating system without patches installed and using typical defaults and optionsMake sure that there is no data on the system  … 
Definition continues below.
HackersWhite Papers (View All Report Types)
26 - 50 of 108 Matches Previous Page  | Next Page
A Step-by-Step Survival Guide to Data Protection
sponsored by Druva Software
WHITE PAPER: This white paper provides step-by-step advice on how organizations can protect their corporate data from threats like lost devices and eDiscovery issues.
Posted: 16 May 2014 | Published: 30 Apr 2014

Druva Software

What Are The Real Threats? Using Threat Research Reports to Set Security Priorities
sponsored by IntraLinks, Inc
WHITE PAPER: This resource features key findings from the top 4 security reports published in the last year to help IT pros better understand and identify potential threats.
Posted: 14 May 2014 | Published: 14 May 2014

IntraLinks, Inc

Combatting Advanced Threats with Endpoint Security Intelligence
sponsored by IBM
WHITE PAPER: Read this resource to explore an integrated approach that combines the capabilities of endpoint management with security intelligence to close gaps against a malicious threat environment.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM

Are You Doing All You Can to Protect Your Critical Business Information?
sponsored by Citrix
WHITE PAPER: Gain insight on the current vicious threat landscape and 7 information security best practices to keep your data protected wherever it goes.
Posted: 09 May 2014 | Published: 31 Dec 2013

Citrix

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
Posted: 05 May 2014 | Published: 31 May 2013

Citrix

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot

Advanced Threat Protection with Dell SecureWorks Security Services
sponsored by Dell SecureWorks
WHITE PAPER: This guide explores the varying types of advanced threats, their motives, and how you can enhance your security strategy to better detect and resist them.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

Dell SecureWorks

Accelerating Incident Response and Reducing Security Risks
sponsored by Dell SecureWorks
WHITE PAPER: This essential whitepaper outlines the advantages of managed security services providers and how your incident response strategy is essential to your overall security plan.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Dell SecureWorks

Cisco 2014 Annual Security Report
sponsored by Cisco
WHITE PAPER: This information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

Cisco

Hackers, Hacking, and CEHv8
sponsored by Global Knowledge
WHITE PAPER: This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.
Posted: 19 Mar 2014 | Published: 21 Jan 2014

Global Knowledge

Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper highlights how big data analytics can be utilized to react to security incidents, as well as predict, prevent and take real-time action.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

IBM

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

IBM

What can you do differently to guard against threats from rapidly evolving mobile malware?
sponsored by IBM
WHITE PAPER: This must-see white paper discusses the emerging and evolving risks associated with mobile computing and applications. Also inside, find insight to help you effectively address mobile vulnerabilities.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Protect people, processes and technology from web application threats
sponsored by IBM
WHITE PAPER: This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
Posted: 05 Mar 2014 | Published: 30 Nov 2013

IBM

Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Imperva

Extending Security Intelligence with Big Data solutions
sponsored by IBM
WHITE PAPER: Cybercriminals are continuing to grow and their tactics are becoming more refined. This guide outlines the role big data plays in IT security and how analytics can help thwart cybercrminals.
Posted: 24 Dec 2013 | Published: 31 Jan 2013

IBM

Three Guiding Principles to Improve Data Security and Compliance
sponsored by IBM
WHITE PAPER: In this resource, explore a more holistic approach to data protection that simplifies security measures and compliance reporting in an increasingly complex IT landscape.
Posted: 19 Dec 2013 | Published: 31 Oct 2012

IBM

2013 Cost of Cyber Crime Study: Global Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative study performed by Ponemon Institute describes the current state of cyber crime in 234 organizations across 6 countries, as well as the economic impact that these attacks have on companies over time.
Posted: 25 Nov 2013 | Published: 31 Oct 2013

Hewlett-Packard Company

How Are DDoS Attacks Evolving?
sponsored by Neustar®
WHITE PAPER: This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
Posted: 05 May 2014 | Published: 05 May 2014

Neustar®

The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report
sponsored by Neustar®
WHITE PAPER: This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare.
Posted: 02 May 2014 | Published: 02 May 2014

Neustar®

Making a Business Case for Fraud Prevention Technology
sponsored by IBM
WHITE PAPER: This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

IBM

Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: Access this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
Posted: 08 Apr 2014 | Published: 31 Oct 2013

IBM

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013

RSA, The Security Division of EMC

Information Security Emagazine: Best Practices for the Evolving Threat Landscape
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Hewlett-Packard Limited
26 - 50 of 108 Matches Previous Page    1 2 3 4 5    Next Page
 
HACKERS DEFINITION (continued): … A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. (This includes the hacker, cracker, and script kiddy.) To set up a honey pot, it is recommended that you:Install the operating system without patches installed and using typical defaults and optionsMake sure that there is no data on the system that cannot safely be destroyedAdd the application that is designed to record the activities of the invaderMaintaining a honey pot is said to require a considerable amount of attention and may offer as its highest value nothing more than a learning experience (that is, you may not catch any hackers).
Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement