Trap and trace systems-information security, Computer Network Security


Trap and Trace Systems use techniques to detect an intrusion and trace it back to its source. Trap comprises of honey pot or padded cell and alarm. The drawbacks to trap and trace
- Enticement: procedure of attracting attention to system by placing the tantalizing bits of information in key locations
-Entrapment: luring an individual into committing a crime to get a conviction.
-Enticement is legal and ethical, whereas entrapment is not.


It is used to collect information that attacker would require to launch successful attack. Attack protocol is series of steps or processes used by an attacker, in a logical sequence, to launch attack against the target system or network.

-Footprinting: organized research of Internet addresses controlled by a target organization
-Fingerprinting is a systematic survey of all of target organization’s Internet addresses collected during foot printing phase. Fingerprinting reveals helpful information about the internal structure and operational nature of target system or network for the anticipated attack. These tools are valuable to network defender as they can quickly pinpoint parts of systems or network that require a prompt repair to close the vulnerability.

Port Scanners

Port scanners are tools which are used by both attackers and defenders to identify the computers active on a network, and other useful information. They can scan for specific types of computers, protocols, or resources or their scans can be generic. The more specific the scanner is, the better it can provides attackers and defenders useful information.

Posted Date: 10/9/2012 4:05:18 AM | Location : United States

Related Discussions:- Trap and trace systems-information security, Assignment Help, Ask Question on Trap and trace systems-information security, Get Answer, Expert's Help, Trap and trace systems-information security Discussions

Write discussion on Trap and trace systems-information security
Your posts are moderated
Related Questions
i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

UDP DATAGRAM FORMAT: It is given in the figure below:

Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.

802.11 WIRELESS LANs AND CSMA/CA:  IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data