Tuesday, May 21, 2019
Research on Honey Pots with regard to proofing security
Battling hackers and technological experts who use their knowledge for stealing information and hacking can always be troublesome and costly. Why waste time, effort, energy and fortune losing out thousands of dollars in profits. The use of honey pots and honey tokens can eliminate the need for such risks and enhance the security of the system.Honey tokens and honey pots are not computer systems. In fact, they are software that is designed to interact with unauthorized users and counter their activity. They give you the ability to allow hackers and around the bend into the system and make them liveliness as if they have broken into the system. They hold false data that is kept there for that spiteful user to use and steal. The honey pot then actively saves all the actions performed by the unauthorized user. Using such honey pots and combining it with the data on their actions, many potential takeovers can be subdued. Several malicious invasions can be countered using such honey p ots, and at the same time, the illegal user commending on his capabilities on managing to break into the companys security.A honey pot works by trapping the actions of an intruder by setting a fallacious database that has honey pots are just software that tackles crackers intelligently without them knowing that they have been tracked. The cracker can do whatever they like with data that is as fallacious as dummy data. There is no sensitive data provided to such a cracker and the hackers actions will be under review all the while he is snooping around in the system.They are relatively easy to install and do not require a lot of high technological cost or monitoring. merely they are highly effective in countering illegal break-ins to sensitive data. As soon as there is an access to the system through any indefinable way, the honey pot gets activated and provides the user with databases that is of no use to the company and is actually in place to fool the hacker.Therefore, Mr. Lloyd, given the obvious benefits of sugar cultivation an illegal user and then finding the security holes that they used in breaching the system, the company should consider implementing the honey pot system. Using this we can then plenty our security holes so that they can stop other crackers breaching our security again.Bibliography1. What is honey pot? a definition from Whatis.com. Retrieved March 17, 2008, from Search Security vane site http//searchsecurity.techtarget.com/sDefinition/0,,sid14_gci551721,00.html2. Dynamic Honeypots Retrieved March 17, 2008, from Security Focus Web site http//www.securityfocus.com/infocus/1731
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment