Retrieved from https://studentshare.org/information-technology/1610256-class-student-dicussions-answers
https://studentshare.org/information-technology/1610256-class-student-dicussions-answers.
RESPOND TO OTHER DISCUSSION POSTS s College RESPOND TO OTHER DISCUSSION POSTS Kevin, you are spot on with your brief definition of a honeypot in the network. They are a resource in the network that is used for sacrificial protection of the main network. They may be of real help to the network administrators since it can help them to monitor all the intended malicious activity and attacks planned by the hackers. This can be really fruitful in anticipating future attacks and preparing preventive strategies.
Also, you summarized the two types nicely. I would probably say that despite being expensive, larger data – critical organizations should look to implement research honeypots since it goes a step ahead and provides contingency measures for potential threats. You also provided a simple ‘what to do’ measures in order to eliminate the risk of viruses affecting the computer. It is a good insight that you gave about training the new users on how to detect scam emails and not click on the provided unknown links, and also executing an anti-malware or anti-virus scan whenever accessing an external memory drive.
You could have also added not auto-executing flash drive programs or executables. Another thing that I feel should be a part of training for novices should be proper usage of trusted sites for downloads security features available in the browsers.Brain, you defined what Kevin said. You explained how a honeypot is implemented outside the main network and it sacrifices itself for the protection of the main, critical network. The best things that you told about the honeypot networks in general, are the disadvantages of implementing them.
Cost was always a default factor but yes it would take more toil on the system administrator to monitor and look after this network’s resources. I would partially agree with the last comment you made on comparing advantages and disadvantages. For critical data organizations, we do need these honeypots but for smaller organizations, we cannot afford to have such a high cost.You also specifically mentioned what intrusion detection systems and firewalls we can use for information security. As opposed to Kevin, you have provided specific details on three main techniques of ensuring information security within the organization.
You also made good points on differentiating how software and hardware security systems work in unison to provide maximum security to the organizational data. I completely agree that software based security is either algorithmic or rule based but hardware based security is almost rule based. The explanation of how routers work is amazing and would even urge the layman, simulate a network in his mind as a water ship!Dustin has provided some more insights on how viruses work, what are their different types and how can you detect if your computer is infected with a virus or not.
I may not agree with all the symptoms list though because slow performance can be also because of not enough free memory or I/O locks. Erratic behavior might be because of buggy application too and data losses occur mostly because of sniffing attacks. Only frequent crashes can be fully associated with the malicious activity of the entering virus. Spyware is a growing potent threat and an anti-spyware should be installed by users who uses internet. Internet is the prime breeding ground for spywares as we don’t really have them on private intranets or local FTP’s.
Thus, spywares are web-based and used mostly by hackers or sniffers to steal information. They may not affect how computer behaves but might trigger a Denial of service attack on a website.Brain, your explanations connect the points and tells how viruses, web and other malicious code work together. Good computing practices would include trusted downloads and monitoring malicious execution of services from Task Manager. Your personal experience is a good source of enlightenment. I still remember those retro viruses and I lost my all partitions.
The only difference was the fact that I was using AVG instead of Norton. I didn’t move the files to quarantine and deleted the anti-virus protection shield files. The virus soon destroyed my data and I had to do the same, reformat. The best remedy is to report these detected viruses or maybe change the registry values to defaults. Another important comment set is those about spyware and tracing cookies. I guess this problem is solved now since most browsers provide incognito browsing which is the best way to avoid tracing cookies.
I would still say that network engineers and web developers have got their work cut out in dismantling hackers and only continuous technology innovation can help in this regard.
Read More