A-Z Popular New Security Search »
Information Security
 
Related Guides

3 Examples of a Tarpit

 , updated on
A tarpit is a computing resource that is intentionally slow in order to prevent or defend against information security attacks. The following are common examples.

Authentication

A website is slow to confirm if a password is correct. This can help to defend against brute force guesses of passwords.

Email

An email server is extremely slow in processing requests from an unknown or suspicious host. This may prevent spam.

Networks

A security device intentionally slows connections to a network in order to defend against a distributed denial of service attack.
Overview: Tarpit
Type
Definition
A resource that is intentionally slow in order to prevent or defend against information security attacks.
Related Concepts
Next: Honeypot
More about information security:
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Networking

A list of networking techniques and concepts.

Overlay Network

Building networks on top of networks for security and privacy.

Internet Backbone

An overview of internet backbones.

Peer-to-peer

A definition of peer-to-peer with a technical overview and example.

Proxy Server

A definition of proxy server with common examples.

Microtrenching

An overview of microtrenching.

Proximity Awareness

The definition of proximity awareness with examples.

Optical Fiber

A list of optical fiber applications.

Near Field Communication

A definition of near field communication with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map