honeypots and the Honeynet can be seen as security tools. They act as digital bait and actu bothy
attract intruders. Honeypots ar mistaken computer systems that act like a decoy. They are
use to draw in intruders and collect data on them. The decoy seems to contain operating system
vulnerabilities that attract hackers. The Honeypot appears to be a legitimate machine. The
Honeynet is a profit where all data is looked at and collected. It was formed by a conclave of
professionals who expanded on the Honeypot concept and pauperizationed to distribute their knowledge.
The advantages of a Honeypot are to deter flesh outs. Few hackers exit try to agree a
system designed to admonisher and capture their activities. Furthermore, Honeypots educate,
because they provide data on attack methods. Finally, perception of inside attacks and the
confusion for attackers are two other benefits of the Honeypots. continue in the same light,
the advantages of the Honeynet are that it operates within a network and a wide variety of
production systems are established. The Honeynet raises sense of threats and vulnerabilities
that exist, and it teaches and informs security professionals.
Finally, even though the Honeypot and Honeynet capture a lot of data concerning vulnerabilities
of a system, they can be used by hackers as tools. It is part of the responsibility of the system
administrator to carefully monitor activity in the decoy. To limit the scope of an attack that can
be launched from a compromised Honeypot, rules should be established on the firewall for
outbound traffic. The Honeynet project site contains a wealth of data pertaining to
forensic analysis of compromised sites. The proactive, savvy hacker could use this wealth of
information to determine the newest hacking safeguard and then plan to compromise it.
Works Cited:
Honey Pots and Honey Nets - Security through Deception. (nd). Retrieved from...If you want to get a full essay, order it on our website: Ordercustompaper.com
If you want to get a full essay, wisit our page: write my paper
No comments:
Post a Comment