Report reveals risk to cloud platform
Red Book
Red Book

Pre-cum-Mains GS Foundation Program for UPSC 2026 | Starting from 5th Dec. 2024 Click Here for more information

  1. According to a Sophos report titled ‘Exposed:Cyberattacks on Cloud Honeypots’ more than five million attacks were attempted on the global network of 10 honeypots within a 30-day period.This demonstrates how cybercriminals are automatically scanning for weak open cloud buckets.
  2. Cybercriminals has also attacked a Mumbai cloud server honeypot with more than 6.7 Lakh attempts over a 30-day period.It is second to a US-based honeypot at Ohio that recorded more than 9.5 Lakh login attempts during the same period.
  3. A honeypot is a system designed to mimic likely targets of cyber-attackers so that security researchers can monitor cyber criminal behaviour.
  4. The types of honeypots are (a)A low-interaction honeypot is a honeypot that once found by the hacker,will not be of much use to them and (b)A high-interaction honeypot permits the attacker to go further in order to gather additional information about their intentions.

Discover more from Free UPSC IAS Preparation For Aspirants

Subscribe to get the latest posts sent to your email.

Print Friendly and PDF
Blog
Academy
Community