Documente Academic
Documente Profesional
Documente Cultură
]
]
]
` !
1).Many computer network
are currently connected
to internet.
r
]$
a ystem has no production
value, no authorized
activity.
a ow-interaction
a igh-interaction
a oneynets are a
research honeypot.
a Not a product, but an
architecture.
a A oneynet is a
network,placed behind
a reverse firewall
that captures all
inbound and outbound
data.
a An entire network of
systems designed to
be compromised.
]$#$
a oneynet collect data for
analysis without the knowledge
of the hackers.
a he data that is collected
must be store in a location
different from honeynet to
make it secure.
]$#
a t concern protecting other
networks from being attacked and
compromised by computers on
honeynet.
a
a
J J $
a hen used for production
purposes, honeypots are
protecting an organization.
a his would include:
a revention
a etection
a esponse
J
a irst it prevents is against
automated attacks,such as auto-
rooters.
a ticky honeypots(lowing down
hacker¶s speed.)
a y confusing attackers.
£
£
£
£
2
$
a
nce an organization has
detected a failure then
response comes in to play.
a hen system hacks by the
hackers how to stop them to
prevent the system is done by
response part.
a t is done at mostly high-
interection.
2
$ $
a hen used for research purpose, honeypots
are being used to collect information.
a high-interaction honeypots are used for
research purposes.
a owever, either type of honeypot can be
used for either purpose.
a 2
are run by a volunteer,
non-profit research organization or an
educational institution to gather
information about the motives and tactics
of the community targeting different
networks.
a hey are used to research the
threats organizations face, and to
learn how to better protect against
those threats.
a information is then used to protect
against those threats.
a Military, government
organizations, security
companies applying the
technologies
a rimarily to identify threats
and learn more about them
a
ommercial application
increasing everyday
r
%