Unit_8_Assignment_2.docx IT4071 Unit 8 Assignment 2 IT4071 Introduction With the indu
- From Economics, General Economics
- Termpaper
- Rating : 3
- Grade : B
- Questions : 0
- Solutions : 15269
- Blog : 0
- Earned : $2452.10
Unit_8_Assignment_2.docx IT4071 Unit 8 Assignment 2 IT4071 Introduction With the industry the way it is during this point and time there are risk at every turn thus there needs to be ways in which we are able to protect and ensure the security of our networks. The use of Honeypots are valuable since they are created in order to lure in, then catches, and track an attacker to see behaviors. They are consisted generally of a “normal†PC located on a separated network or in a DMZ. This PC and network would appear legitimate but would be secured away and would be fake but look like production. This environment would be easy to access and would appear to have valuable information that is easy to get to but would all be invalid information just placed there to draw them in. With the use of a honeypot, it would reduce the challenges that IDSs have with being able to capture attacks such as false positive and other results. The IDS would be put into place to be able to notify an Admin when an attacker is found within the DMZ (aka Honeypot) and then record all data about the attacker and their behaviors and patterns. With this attacker, being in a separated environment within a DMZ (demilitarized zone) the Admin would be able to take this system down after taking the time to examine and understand the attacker and what they were aiming for. Pros and Cons of Honeypots The pro of having a honeypot would be to be able to aid in the process of protecting the network and data from outside attackers. O
[Solved] Unit_8_Assignment_2.docx IT4071 Unit 8 Assignment 2 IT4071 Introduction With the indu
- This solution is not purchased yet.
- Submitted On 20 Sep, 2022 10:37:14
- Termpaper
- Rating : 3
- Grade : B
- Questions : 0
- Solutions : 15269
- Blog : 0
- Earned : $2452.10