A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

3 Examples of a Tarpit

 , updated on March 08, 2017
A tarpit is a computing resource that is intentionally slow in order to prevent or defend against information security attacks. The following are common examples.

Authentication

A website is slow to confirm if a password is correct. This can help to defend against brute force guesses of passwords.

Email

An email server is extremely slow in processing requests from an unknown or suspicious host. This may prevent spam.

Networks

A security device intentionally slows connections to a network in order to defend against a distributed denial of service attack.
Overview: Tarpit
TypeInformation Security
DefinitionA resource that is intentionally slow in order to prevent or defend against information security attacks.
Related ConceptsHoneypot
Information Security
Authentication
Networking
Brute Force

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Data Breach
Data Remanence
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Fatigue
Proof Of Work
Sandbox
Security Controls
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Networking

A list of networking techniques and concepts.

Overlay Network

Building networks on top of networks for security and privacy.

Net Neutrality

A definition of net neutrality.

Proxy Server

A definition of proxy server with common examples.

Microtrenching

An overview of microtrenching.

Proximity Awareness

The definition of proximity awareness with examples.

Optical Fiber

A list of optical fiber applications.

Near Field Communication

A definition of near field communication with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map