Business > CASE STUDY > Unit_8_Assignment_2.docx IT4071 Unit 8 Assignment 2 IT4071 Introduction With the indu (All)
Unit_8_Assignment_2.docx IT4071 Unit 8 Assignment 2 IT4071 Introduction With the industry the way it is during this point and time there are risk at every turn thus there needs to be ways in whic... h we are able to protect and ensure the security of our networks. The use of Honeypots are valuable since they are created in order to lure in, then catches, and track an attacker to see behaviors. They are consisted generally of a “normal†PC located on a separated network or in a DMZ. This PC and network would appear legitimate but would be secured away and would be fake but look like production. This environment would be easy to access and would appear to have valuable information that is easy to get to but would all be invalid information just placed there to draw them in. With the use of a honeypot, it would reduce the challenges that IDSs have with being able to capture attacks such as false positive and other results. The IDS would be put into place to be able to notify an Admin when an attacker is found within the DMZ (aka Honeypot) and then record all data about the attacker and their behaviors and patterns. With this attacker, being in a separated environment within a DMZ (demilitarized zone) the Admin would be able to take this system down after taking the time to examine and understand the attacker and what they were aiming for. Pros and Cons of Honeypots The pro of having a honeypot would be to be able to aid in the process of protecting the network and data from outside attackers. O. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]
Last updated: 1 year ago
Preview 1 out of 5 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
We Accept:
Connected school, study & course
About the document
Uploaded On
Sep 18, 2022
Number of pages
5
Written in
This document has been written for:
Uploaded
Sep 18, 2022
Downloads
0
Views
26
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·