OtherPapers.com - Other Term Papers and Free Essays
Search

Business Ethics

Essay by   •  September 28, 2013  •  Essay  •  596 Words (3 Pages)  •  2,156 Views

Essay Preview: Business Ethics

Report this essay
Page 1 of 3

Honey Pots

Over the last several years, the issue of security has been increasingly brought to the forefront. This is because more hackers are able to successful breach different security protocols. Recently, honeypots have evolved to protect against these kinds of challenges. This is a system which is set up on the Internet to attract those who are trying to breach other computers or servers. (Spitzner, 2010)

To fully understand how this is utilized requires carefully examining the different types. This will be accomplished by focusing on the various kinds, the benefits of using a virtual machine for implementation and the resources need to set them up. Together, these elements will offer specific insights on the benefits of using honeypots. (Spitzner, 2010)

Research two different honeypots that are available to use free or open source.

The first type of honeypot is Honeyd. This is an open source application which is easy to deploy and can be uploaded mainly to a Linux based operating systems. It is focused on monitoring the unused IP addresses of an organization. This is because hackers will search for any kind of backdoor solution to gain access to the database. One way they are able to do this is through scanning all of the IP addresses that are available. When a Honeyd detects this, it isolates the threat and alerts the webmaster that an attack is in progress. This limits the ability of hackers to breach these vulnerabilities and mitigate any kind of threats early. In this case, Symantec was selected utilizing a pure honeypot. (Spitzner, 2010) (Whitman, 2009)

The second kind is a Bubblegum Proxy Pot. This is an open source solution which is designed to deceive and detect spammers by providing them with a list of IP addresses for them to go through utilizing http connects. The basic idea is to slowdown their ability to access the site and obtain information about vulnerable areas. This is a low interaction honeypot and it was selected from Digiater. ("Overview," 2011) (Whitman, 2009)

Discuss the benefits of utilizing a virtual machine for the implementation of the honeypots that you selected

The biggest advantage of a virtual machine is that it enables administrators to easily monitor the activities of hackers using the FTP file. This will record what actions they are taking, as these people are attempting to imitate the steps utilized by the webmaster. When this happens, it makes it easier to detect and understand what is happening. This is the point, the threat can be identified and steps can be taken by providing a record of the various events as they are occurring. (Posey, 2007)

What resources would you need to be able to set up and utilize a honeypot for the devryu.net domain (two paragraphs)?

The best way to set up a honeypot system is to use

...

...

Download as:   txt (3.5 Kb)   pdf (62.7 Kb)   docx (9.9 Kb)  
Continue for 2 more pages »
Only available on OtherPapers.com