To systematically detect and defend against hacker attacks on industrial targets, so-called honeypots scenarios are often used. In many of these, false pots of honey are left out in the open and the real pots of honey—valuable data, software, and hardware—are protected as a result. A good example of a false pot of honey in an industrial environment is a data-routing network switch. In this article, we take a closer look at how this could theoretically work in an operational production facility.
First Name
Last Name
Email
Comments