ABSTRACT
This chapter discusses honeypot (and honeynet) basics and definitions, and then outlines important
implementation and setup guidelines. It also describes some of the security lessons a company can derive
from running a research honeypot, based on this author’s experience running a research honeypot. This
chapter also provides insight into the techniques of attackers and concludes with considerations useful
for answering the question, “Should your organization deploy a honeynet?”