.

Thursday, February 28, 2019

Research on Honey Pots with regard to proofing security

Battling hackers and technological experts who use their knowledge for stealing information and hacking contribute always be troublesome and comprisely. Why waste time, effort, energy and venture losing out thousands of dollars in profits. The use of dear multitudes and beloved tokens can scorn the need for such risks and enhance the security of the administration.Honey tokens and honey bow windows are not computer outlines. In fact, they are software that is designed to act with unauthorized exploiters and counter their activity. They give you the ability to allow hackers and crackers into the system and make them feel as if they have broken into the system. They hold rancid data that is kept there for that malicious user to use and steal. The honey pot hence actively saves all the actions performed by the unauthorized user. use such honey pots and combining it with the data on their actions, many latent takeovers can be subdued. Several malicious invasions can be c ountered apply such honey pots, and at the same time, the sinful user commending on his capabilities on managing to break into the companys security.A honey pot works by trapping the actions of an intruder by setting a fallacious database that has honey pots are just software that tackles crackers intelligently without them knowing that they have been tracked. The cracker can do whatever they alike(p) with data that is as fallacious as dummy data. There is no sensitive data provided to such a cracker and the hackers actions will be under review all the while he is snooping around in the system.They are relatively easy to install and do not require a lot of high technological cost or monitoring. But they are highly effective in countering illegal break-ins to sensitive data. As soon as there is an access to the system through any undefined way, the honey pot gets activated and provides the user with databases that is of no use to the company and is actually in place to bum the ha cker.Therefore, Mr. Lloyd, given the obvious benefits of sugar coating an illegal user and then finding the security holes that they used in breaching the system, the company should consider implementing the honey pot system. Using this we can then fix our security holes so that they can stop other crackers breaching our security again.Bibliography1. What is honey pot? a definition from Whatis.com. Retrieved March 17, 2008, from Search Security Web situate http//searchsecurity.techtarget.com/sDefinition/0,,sid14_gci551721,00.html2. Dynamic Honeypots Retrieved March 17, 2008, from Security Focus Web site http//www.securityfocus.com/infocus/1731

No comments:

Post a Comment