a system that, when installed on a critical network, is designed to lure a potential hacker away from other more important systems on that network
A system that is left open and vulnerable in a network to attract hackers to attack it. This is done by network administrators to monitor the different methods the hackers may employ.
A program that stimulates a network service that you designate on your computer's ports. An attacker assumes you're running vulnerable services that can be used to break into the computer. A honey pot gives you warning of a more concerted attack by logging the attacker's access attempts to the ports.
A system designed to look like a regular network but which, in fact, monitors and traces unauthorised access.
A computer designed to attract crackers so that they can be observed in action. It is usually well isolated from the rest of the network, and carefully monitored. Different from an iron box in that its purpose is to attract, not merely observe.
Honey Pot is a simulated store of network information to lure an attacker into wasting his time at the bastion (instead of attacking the real network).
Programs simulating one or more network services that you designate on your computer's ports. An attacker assumes you're running vulnerable services that can be used to break into the machine. A honey pot can be used to log access attempts to those ports including the attacker's keystrokes. This could give you advanced warning of a more concerted attack.