Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Application Controls, Monitoring, and Honeypots - Essay Example

Comments (0) Cite this document
There are a variety of both commercial and public domain intrusion detection systems, most of which use misuse detection. As Ilgun, Kemmer and Porras (1995) explain, they depends on a set of rules that define different types of known intrusion signatures…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Application Controls, Monitoring, and Honeypots
Read TextPreview

Extract of sample "Application Controls, Monitoring, and Honeypots"

Download file to see previous pages In addition to maintaining the rules, someone must respond to the alerts. Sometimes signatures may also match valid activity, meaning that responding to alerts first requires determining whether the alert is the result of an intrusion or unexpected, but valid, system activity. All of these require highly trained personnel to carry out (Skoudis, 2002). The implication here is, and as our company's ICT director confirmed, that current intrusion detection systems are somewhat limited in capacity. This does not mean that current intrusion systems are not effective but only they are not as effective as required. Within the context of the stated, it is commonly held that anomaly detection will ultimately prove more valuable and robust because it has the potential to identify previously unknown intrusions or attacks. It is, thus, that the corporation is currently investigating the implementation of honeypots.
Honeypots are new security technologies that, while not a replacement for traditional intrusion detection systems, address some of the weaknesses of intrusion detection systems (Spitzner, 2003). As their only purpose is to be attacked, all traffic to the honeypot can be considered an intrusion or an anomaly of some sort. For this reason there is no need to separate normal traffic from anomalous; this makes any data collected from a honeypot of high value. Added to that, since honeypots have no production value, no resource or person should be communicating with them, and therefore any activity arriving at a honeypot is likely to be a probe, scan, or attack. Their value comes from their potential ability to capture scans, probes, attacks, and other malicious activity (Spitzner, 2003).
There are three types of honeypots: low interaction, medium interaction, and high interaction. In order to collect information a honeypot must interact with the attacker, and the level of interaction refers to the degree of interaction the honeypot has with a potential attacker (Spitzner, 2003). A low interaction honeypot provides minimal service, like an open port. A medium interaction honeypot simulates basic interactions like asking for a login and password, but providing no actual service to log into. High interaction honeypots offer a fully functioning service or operating system, which can potentially be compromised (Spitzner, 2003).
Honeypots have also been shown to be effective against Internet worms. Laurent Oudot (2006) demonstrated how MSBlast could be detected and captured using Honeyd and some simple scripts. He also showed how worm propagation can be slowed using Honeyd to attract the worms attention and then respond very slowly to its requests. Using scripts, Oudot demonstrated how a honeypot could even launch a counter attack against a worm outbreak, either by isolating services or network segments, or by abusing the same vulnerability the worm used and then trying to kill the worm process.
Honeypots do face several important challenges: 1) honeypots are totally unaware of attacks not directed at them, 2) they must avoid being fingerprinted because if an attacker can easily identify honeypots their usefulness will be severely limited, and 3) like so many security technologies, they require configuring and maintaining by a knowledgeable person (Spitzner, 2003).
Honeypots, because of their very nature, excel at detection. What makes them most attractive in the area of detection is the fact that they ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Application Controls, Monitoring, and Honeypots Essay”, n.d.)
Retrieved from
(Application Controls, Monitoring, and Honeypots Essay)
“Application Controls, Monitoring, and Honeypots Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Application Controls, Monitoring, and Honeypots

Johnson Controls

... Johnson Controls The process of analyzing and selecting various proposals for capital investments is called capital budgeting. Capital budgeting models are one of several techniques used to measure the value of investing in long-term capital investment projects. Firms invest in capital projects to expand production to meet anticipated demand or to modernize production equipment to reduce costs (Emery et al., 2007). Capital investment can also be made for many noneconomic reasons, such as installing pollution control equipment, converting to a human resources database to meet some government regulations, or satisfying non-market public demands. Information systems are also considered long-term capital investment projects. The following...
5 Pages(1250 words)Research Paper

Internal Controls

...?It is important for companies to safeguard the assets and inventory of the firm. Business owners and managers have to protect themselves against internal and external threats. The employees of the company posed an internal threat to the company (Goulding, 2011). A lot of employees steal from businesses whenever they assess that the company does not have any measures to prevent the unethical action of theft. A way for companies to protect the assets of the company is by implementing internal controls. The asset that must be protected the most due to its liquidity is the cash of the company. Cash is the most important asset of a company due the fact it can be used to pay for the purchases, payroll, and debt obligation of a firm (Deloitte...
4 Pages(1000 words)Assignment


...Control Executive summary This company has been dealing in the sales of cereals for over ten years and has met many challenges of which some have influenced its performance both positively and negatively. For years now, the company has been complaining of the over-weight of boxes that needed a quality analyst’s report and advise Based on the weight of the cereal boxes (Konrad, 2006). This paper is therefore detailed to provide a statistical analyst report based on the based on the weight of the cereal boxes. It is also to give the control limit of the cereal boxes and appropriate measures if the control limits are not applicable. Organizational report There are certain risks, threats and challenges that a company may be faced...
2 Pages(500 words)Essay

Project Controls

...Project Controls Insert Insert Grade Insert Project management best practice requires that there is an appropriate plan for control of unfocused challenges (Roberts, 2011). In line with this requirement, this paper addresses the various changes that may be necessary during project implementation. Having gone through the necessary procedures and steps for the establishment of the planned server upgrade, it is important that issues that may crop up during the execution phase be adequately addressed. This will go a long way in ensuring that the history of project failures in the past affected by inflated budgets, extended timelines and wastage of resources among others is not repeated in the planned project. This paper will therefore discuss...
2 Pages(500 words)Essay

Honeypots and Firewalls

...Honeypots and Firewalls Honeypots and firewalls Multiple screen subnet architecture vs. dual homed host Multiple screen subnet architecture offers or runs it provisions originating from a host linked to manifold grids. Its source is however switched off. The source of the network ought to be linked to the heart of the grid by the use of an isolated router. This design permits packages to pass through the network into the heart of the grid. In contrast, a dual homed design is created in a manner that does not permit these packages to pass through. The dual homed host is created about two or more grids crossing each other. A dual homed host can be deployed when services needs to be deliver through proxy whereas a multiple screen subnet can...
2 Pages(500 words)Assignment


... Monitoring of Internet Usage The privacy of data has been a trending concern in today’s society. Employershave put in place measures that monitor the usage of computers by their employees. Some employers monitor the internet sites accessed by the employees in the course of working. In the recruitment process, the employer must inform the employee on the company’s online privacy policy. If the employer does not communicate such policies to the employee, then they have no right to monitor the internet usage of the employees. However, in most states, employers do not have an obligation by law to disclose whether they monitor the employee internet usage (Lawinfo). It may be legal for an employee to make negative comments about... Monitoring of ...
1 Pages(250 words)Essay

Access Controls

...Develop a 2 page paper defining access controls.  As society progresses to 21st security, the concept of security becomes a critical element in a very advanced world. Commerce, transactions, and work is conducted through the internet and technology. Leaving contemporary ways also results in more vulnerabilities with new technologies. This paper will discuss the many facets of protecting these vulnerabilities against large-scale attacks and discuss many facets of access controls. One of the access control is physical access. Physical access is pivotal because it is the first level of define. One great example is a mechanical lock that acts as a defense mechanism. As a matter of fact, intelligent readers are one of the most crucial elements...
2 Pages(500 words)Coursework

Internal Controls

SONY: Internal Control According to Gilbert, Martin 2004, pp.306, internal control is a process for assuring achievement of anorganizations objectives, operational efficiency and effectiveness, dependable financial reporting, and compliance with regulations, laws and policies. In the case of SONY, some of the aforementioned roles of internal controls have not been achieved as a result of various internal control weaknesses and deficiencies. In the recent story carried by the New York Times, the corporation is at a very high risk of incurring huge losses if measures are not taken to protect the gains that the company has made.
Significantly, the company has been marred will intolerable control environment. The management has fai...
1 Pages(250 words)Essay


...Statistical quality control Statistical quality control scenario Control limits Upper control limit = 6.33 + (0.06/ (3)1/2) = 6.43 Lower control limit = 6.33 - (0.06/ (3)1/2) = 6.23 The control for the weight of the boxes is not bad off . Each set has three boxes, the first two boxes have weight that are within the weight limit of 6.2 and 6.4 ounces, but the third box to be added to complete the set exceed the limit. This therefore, means the company suffers a loss for those ounces supplied to their clients that have not been paid for. From the X-chart, it can be noted the first box has the lowest weight than the other boxes followed by the second box. It can be concluded that the control measures work out for the two boxes. Analyzing...
2 Pages(500 words)Assignment

International Relations Theory Application

Our proposition is a theory from Russett  who said, “Democracies rarely fight each other (an empirical statement) because they have other means of resolving conflicts between them and therefore do need to fight each other (a prudential statement).”

Russett3 then argued then the by this reasoning, the more democracies there are in the world, the fewer potential adversaries we and other democracies there are in the world, the fewer potential adversaries democracies will have and the wider the zone of peace.

The proposition means that democratic peace as a concept in international relations will promote peace. I believe that the proposition is correct because of the validity of the arguments use...
8 Pages(2000 words)Term Paper

Balanced Scorecard - An Approach for Application in Public Sector Organization

The framework should enable the organizations to identify and understand the systemic nature of their business, the key linkages and cause and effect relationship. Through this process, the organization is able to balance its priorities, allocate the available resources for maximization of the profits of the organization and generate realistic business plans. Over the years several research studies have been conducted in this field of the management science, and models like Balanced Scorecard has been developed which are basically designed for helping the organizations in their drive towards being more competitive in achieving their goals. This paper brings out an evaluation of the Balanced Scorecard model as applied to a public s...
8 Pages(2000 words)Report

The Role of Nurses in the Delivery and Monitoring of Quality of Care to Patients

It is the responsibility of a nurse to deliver and monitor the quality of care to its clients. Since nurses serve as caregivers, their end should be that their patients must achieve relief of their disease condition In every disease condition, the nurse should give the best form of nursing care she could possibly provide. If one method is ineffective to a particular patient, the nurse as change agent must implement “change” in the quality of care to make it successful. The positive and negative outcomes of a patient’s condition could therefore be attributed to the management and leadership qualities a nurse possesses in implementing change.
In today’s changing times, management has taken a new phase....
7 Pages(1750 words)Literature review

The Application of Information Systems in Modern Organisations

On one hand, Information Systems must be aligned with the Organization to provide timely, relevant, accurate and trustworthy information that important groups within the organization needs, to exercise better options in strategizing business decisions. On the other hand, Organizations must be aware of and open themselves to the influences of Information systems in order to benefit from new technologies.

Information Systems have evolved in a way that system design techniques like Business Process Reengineering (BPR), Total Quality Management (TQM), Enterprise Resource Planning (ERP), Supply Chain Management (SCM) and many others have

Thomas Davenport (1993), a well-known BPR theorist, uses the term process i...
11 Pages(2750 words)Coursework

Research Methodologies and Their Application to Counseling

Data must be subjected to the thinking process in terms of ordered reasoning.

Descriptive Research describes and interprets what it is. It is concerned with conditions of relationships that exist; practices that prevail; beliefs, processes that are going on; effects that are being felt, or trends that are developing.

The process of descriptive research goes beyond mere gathering and tabulation of data. It involves the elements or interpretation of the meaning or significance of what is described. Thus description is often combined with comparison and contrast involving measurements, classifications, interpretation, and evaluation.

In other words, descriptive research may be defined as the purposive...
8 Pages(2000 words)Term Paper

Infrastructure Application and Review: France

Referring specifically to the country’s water network, Jacobson et al. (1995) notice that ‘although waterworks facilities in France are predominantly government-owned, private firms operate and manage most systems under an array of contracting and leasing arrangements’ (Jacobson et al., 1995, online article). The above study describes the general terms under which the development of infrastructure systems in France is progressing. It should be noticed at this point that in France, the government’s policies regarding the development of infrastructure systems were not always effective – moreover, they were rather limited. Indeed, in a report published by the OECD in 2005, it is noticed that ‘in 19...
9 Pages(2250 words)Case Study

Organizational Behaviour: The Application of Theory X and Y

People are not just a “resource”. Each person is a complicated web of likes, dislikes, ambitions, fears, interests, passions – in short, every imaginable sentiment and belief. While it is true that people respond to a degree to external pressure, there is a point at which they will only act when they are personally convinced of the usefulness and rightness of their actions.
In an attempt to understand in a scientific way the principles by which people may be motivated, a man named Douglas McGregor had formulated a theory on human resource motivation. This is known as the principle of Theory X and Theory Y.
Almost 50 years ago, in 1960, Douglas McGregor began a debate when a published his book entitled T...
10 Pages(2500 words)Literature review

Microprocessor System and Application

In a computer, a processor commonly involves one or more microprocessors (also acknowledged as chips), which are silvers of silicon or other substance stamped with many little electronic circuits. To perform operations on data, the computer passes electricity all the way through circuits to execute an instruction (Norton 2001.p. 5). The innovation in technology has brought a lot of facilities for us. We have better ways of life and all the facilities regarding better production and domestic tasks. Such as in the industrial production we have automatic robots that are welding, packing, moving and carrying out several other development-related tasks. These robots are pre-programmed and microprocessors based chips are controlling all...
6 Pages(1500 words)Assignment

Law of Evidence Regarding the Application of Electronic Monitoring Equipment

... replied that he had some to sell for a friend. The officers are shown in and identifying the plants informs Tom in respect of the offence. Tom states that he thought the plants his friend had left him to sell were ordinary house plants. Question: Identify the issues in the case. In respect to each issue advise Tom who has the burden of proof and the standard of proof required Introduction In the above scenario, it will be necessary to examine the law in relation to the use of electronic monitoring equipment. This will involve an examination of case law in order to determine whether the use of such equipment would be permitted in this particular situation, as well as the legality of the officers entering his house when he was out...
7 Pages(1750 words)Case Study

Selecting and Model and Anticipating Barriers Application

... them experience a more gratifying, and rewarding lifestyle by changing their behavior and thought patterns. It focuses on helping patients to monitor and manage their thinking in a better way. The whole concept is based on the theory that both behavior and thought can affect a patient’s symptoms and be obstacles to that patient’s eventual recovery. CBT can play an essential role in aiding patients in the identification, and subsequent correction of their negative thoughts that end up influencing their feelings and emotions. These feelings and emotions, in turn, can have an effect on influencing how the client thinks and acts. CBT can be an integral asset in helping the child abuse and neglect perpetrators in the identification...
7 Pages(1750 words)Research Paper

Group Development Application

... Group Development Application: Introduction This plan shall be used for managing a group of employees in a family building construction company. The plan shall be fundamental in guiding my professional relations with the employees of the company in the future when I take over as manager. It is fundamental to note that it is pertinent to understand the nature of everyday activity of the company. It will also be prudent to analyze the levels of skills the company utilizes to meets its daily operations. To begin with, this is a medium sizes company which employees 430 employees. Amongst the employees in the company, 200 are permanent employees while the rest are usually contracted whenever there is a project. Of the 200 permanent employees...
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Application Controls, Monitoring, and Honeypots for FREE!

Contact Us