Business > CASE STUDY > Unit_8_Assignment_2.docx IT4071 Unit 8 Assignment 2 IT4071 Introduction With the indu (All)

Unit_8_Assignment_2.docx IT4071 Unit 8 Assignment 2 IT4071 Introduction With the indu

Document Content and Description Below

Unit_8_Assignment_2.docx IT4071 Unit 8 Assignment 2 IT4071 Introduction With the industry the way it is during this point and time there are risk at every turn thus there needs to be ways in whic... h we are able to protect and ensure the security of our networks. The use of Honeypots are valuable since they are created in order to lure in, then catches, and track an attacker to see behaviors. They are consisted generally of a “normal” PC located on a separated network or in a DMZ. This PC and network would appear legitimate but would be secured away and would be fake but look like production. This environment would be easy to access and would appear to have valuable information that is easy to get to but would all be invalid information just placed there to draw them in. With the use of a honeypot, it would reduce the challenges that IDSs have with being able to capture attacks such as false positive and other results. The IDS would be put into place to be able to notify an Admin when an attacker is found within the DMZ (aka Honeypot) and then record all data about the attacker and their behaviors and patterns. With this attacker, being in a separated environment within a DMZ (demilitarized zone) the Admin would be able to take this system down after taking the time to examine and understand the attacker and what they were aiming for. Pros and Cons of Honeypots The pro of having a honeypot would be to be able to aid in the process of protecting the network and data from outside attackers. O. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]

Last updated: 1 year ago

Preview 1 out of 5 pages

Add to cart

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

We Accept:

We Accept

Reviews( 0 )

$5.00

Add to cart

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
26
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 18, 2022

Number of pages

5

Written in

Seller


seller-icon
helperatsof1

Member since 3 years

48 Documents Sold


Additional information

This document has been written for:

Uploaded

Sep 18, 2022

Downloads

 0

Views

 26

Document Keyword Tags

Recommended For You

Get more on CASE STUDY »
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·