StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Honeypots and Firewalls - Assignment Example

Cite this document
Summary
Its source is however switched off. The source of the network ought to be linked to the heart of the grid by the use of an isolated router. This design permits…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Honeypots and Firewalls
Read Text Preview

Extract of sample "Honeypots and Firewalls"

Honeypots and Firewalls Honeypots and firewalls Multiple screen subnet architecture vs. dual homed host Multiple screen subnet architecture offers or runs it provisions originating from a host linked to manifold grids. Its source is however switched off. The source of the network ought to be linked to the heart of the grid by the use of an isolated router. This design permits packages to pass through the network into the heart of the grid. In contrast, a dual homed design is created in a manner that does not permit these packages to pass through.

The dual homed host is created about two or more grids crossing each other. A dual homed host can be deployed when services needs to be deliver through proxy whereas a multiple screen subnet can be deployed where packages or packets are required to pass through the network into the grid (Zwicky, Cooper and Chapman, 2000). 2. Worms, Malware, and VirusesWorms, malware, and viruses are common issues facing companies every day. These can be prevented through the use of antiviruses. An antivirus is software that identifies threats and hence blocks them from attacking a computer, an antivirus is also able to delete viruses, worms, and malware that has already attacked a computer system.

Worms, viruses, and malware are sometimes used by hackers to illegally access other peoples’ computers. Ensuring all computers within an organization is therefore important as it will prevent unauthorized individuals from accessing private and confidential information in other peoples’ computers. 3. How to sell a Honeypot to a CIOThe value of a honeypot can be sold to a CIO through elucidating its benefits, values, as well as the potential issues and downsides. Based on its simple design, a honeypot has the capability to gather and assemble trivial and minute cliques and arrays of statistics and information.

Honeypots are created with the main objective of intermingling and networking with aggressors of the system. Therefore, through assembling and gathering each and every information and statistics, novel gizmos used by hackers and other attackers are identified and dealt with amicably. One of the downside off a honeypot is the fact that it can only identify threats that networks or associates with it. Honeypots can also be hijacked by aggressors and hence be used to cause more damage to the system (The Government off the Hong Kong Special Administrative Region, 2008). 4. Honeypots and FirewallsThere are diverging characteristics associated with firewalls and honeypots.

According to Zwicky, Cooper and Chapman (2000), a firewall is characterized by diverse security ranks on the basis of the position and situation of the computer, security or safeguarding of wireless grids and systems such as Wi-Fi. A firewall is used within an organization to stipulate the kind of drivers and packages fitted in a particular computer that should contact the complex system, stops intrudes or aggressors trying to attack the computer, and as well blocks any unwanted programs. Firewalls can be deployed in small or medium sized organizations.

Honeypots on the other hand are characterized by their ability to identify minute and trivial data, encryptions, is created in such a way that aggressors or hackers cannot differentiate them form the grid, and also simple processes and procedures. Since they can identify unauthorized packages trying to access the grid, they are ideal for big organizations. 5. A response plan centered on a honeypot technologyAccording to The Government of the Hong Kong Special Administrative Region (2008), a honeypot technology permits and consents the ordering and ranking of connected warnings and signals.

This is made possible through substantiation and validation of the honeypot system. An alert is considered as useable and binding when it has connected in both the honeypot and the computer grid or system. This is followed by the documentation of a letdown and hence the system amicably responds by sojourning the impeding attack or lessening the consequence of the attack. Once an attack has been identified, the honeypot reacts by tricking and misleading the aggressor that the honeypot is a genuine or authentic grid.

Subsequently, as the aggressor tries to circumvent through the honeypot, his or her IP address is identified and hence prized statistics and data regarding the attack is scrutinized. If need be, the aggressor can be therefore be tracked. It is also of significance to posit that honeypots can also slow down the aggressor by directing to him or her acknowledgement package of nil magnitude. Through accessing the aggressor’s IP dress, the honeypot is therefore able to update information regarding the hacking processes and procedures of the aggressor.

ReferencesThe Government of the Hong Kong Special Administrative Region. (2008). Honeypot Security. Retrieved from http://www.infosec.gov.hk/english/technical/files/honeypots.pdf Zwicky, E. D., Cooper, S., & Chapman, D. B. (2000). Building Internet Firewalls. Sebastopol, CA: O’Reilly.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Honeypots and Firewalls Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Honeypots and Firewalls Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1625142-honeypots-and-firewalls
(Honeypots and Firewalls Assignment Example | Topics and Well Written Essays - 500 Words)
Honeypots and Firewalls Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1625142-honeypots-and-firewalls.
“Honeypots and Firewalls Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1625142-honeypots-and-firewalls.
  • Cited: 0 times

CHECK THESE SAMPLES OF Honeypots and Firewalls

Application Controls, Monitoring, and Honeypots

It is, thus, that the corporation is currently investigating the implementation of honeypots.... honeypots are new security technologies that, while not a replacement for traditional intrusion detection systems, address some of the weaknesses of intrusion detection systems (Spitzner, 2003).... Added to that, since honeypots have no production value, no resource or person should be communicating with them, and therefore any activity arriving at a honeypot is likely to be a probe, scan, or attack....
4 Pages (1000 words) Essay

Identification & Authentication in your organization

honeypots, a m of anomaly detection systems, have been identified by ICT professionals and scholars as extremely robust and potentially valuable because of their capacity to identify previously unknown intrusions or attacks.... Even though the research literature is largely supportive of the implementation of honeypots as a supportive, rather than stand-alone, security system, our ICT director asserted that decisions should be based on a cost-benefit analysis....
4 Pages (1000 words) Essay

Software Development, QA, Anti-Piracy

Information constitutes the core asset of any corporate entity and as information is being increasingly stored on digital media, it is imperative that companies institute security… Given the value of information and the extent to which its unauthorized access and subsequent misuse has the potential to wreak al havoc upon corporate entities, the strategies which companies employ for both the design and implementation of their corporate policies are of singular importance....
4 Pages (1000 words) Essay

Botnets Have Invaded the World of Internet

Internet has made life convenient for mankind and has reduced the distances of the world by providing fast communication.... Like many other things in the world, even Internet has two aspects regarding its usage.... hellip; Hackers and intruders have also become smarter and tech savvy with time due to which newer techniques have been developed to intrude and attack end user's Botnets come under the category of such inventions and become a source of much distress for the computer user....
7 Pages (1750 words) Essay

The PC: 35 Years and Computing - Computer Crime

Computers made life easy and gave revolutionary progress to the area of communication, business, education etc.... With the passage of time, they became an evident part of our lives and business.... However, with this technical… Just like everything in the world has two aspects; computer usage has a dark side related to it as well....
6 Pages (1500 words) Essay

How ISPs Can Help Fight Botnets and Cybe

They adopt a distributed approach due to which it becomes difficult to control or detect them.... They are the basis of many internet crimes like spam, phishing, denial of service attacks etc.... Botnet operators are… ISPs need to collaborate and fight the battle against botnets with mutual help....
14 Pages (3500 words) Essay

Class student dicussions answers

ou also specifically mentioned what intrusion detection systems and firewalls we can use for information security.... I would probably say that despite being expensive, larger data – critical organizations should look to implement research honeypots since it goes a step ahead and provides contingency measures for potential threats.... For critical data organizations, we do need these honeypots but for smaller organizations, we cannot afford to have such a high cost....
2 Pages (500 words) Assignment

Antimalware techniques

? firewalls choke up Malware from corresponding to the outside world.... Anti-malware software computes the hashes for a particular application and compares it with the “Black List” of the hashes that has been identified as the malwares previously.... Updating of anti-Malware software updates the Black List of Hashes (or Signatures) of known… Filtering of URL uses a well maintained Black List/White List database technique to prevent users from steering to web sites that were previously Antimalware Techniques of Antimalware Techniques Black or White List Creation: Anti-malware software computes the hashes for a particular application and compares it with the “Black List” of the hashes that has been identified as the malwares previously....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us