Trap and trace systems-information security, Computer Network Security

TRAP AND TRACE SYSTEMS

Trap and Trace Systems use techniques to detect an intrusion and trace it back to its source. Trap comprises of honey pot or padded cell and alarm. The drawbacks to trap and trace
- Enticement: procedure of attracting attention to system by placing the tantalizing bits of information in key locations
-Entrapment: luring an individual into committing a crime to get a conviction.
-Enticement is legal and ethical, whereas entrapment is not.


 SCANNING AND ANALYSIS TOOLS

It is used to collect information that attacker would require to launch successful attack. Attack protocol is series of steps or processes used by an attacker, in a logical sequence, to launch attack against the target system or network.

-Footprinting: organized research of Internet addresses controlled by a target organization
-Fingerprinting is a systematic survey of all of target organization’s Internet addresses collected during foot printing phase. Fingerprinting reveals helpful information about the internal structure and operational nature of target system or network for the anticipated attack. These tools are valuable to network defender as they can quickly pinpoint parts of systems or network that require a prompt repair to close the vulnerability.

Port Scanners

Port scanners are tools which are used by both attackers and defenders to identify the computers active on a network, and other useful information. They can scan for specific types of computers, protocols, or resources or their scans can be generic. The more specific the scanner is, the better it can provides attackers and defenders useful information.

Posted Date: 10/9/2012 4:05:18 AM | Location : United States







Related Discussions:- Trap and trace systems-information security, Assignment Help, Ask Question on Trap and trace systems-information security, Get Answer, Expert's Help, Trap and trace systems-information security Discussions

Write discussion on Trap and trace systems-information security
Your posts are moderated
Related Questions
Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this

Many applications are vulnerable to intrusion attacks and can provide misleading reports about misbehaving nodes. Some of the mechanisms under such a category include the Bayesian

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

Screened Subnet Architecture This setup provides an extra security layer to screened host architecture by creating a perimeter subnet which further isolates internal network f

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

Encode the following plaintext, using the Caesar cipher:             LORD OF THE RINGS b) The following ciphertext              jw njbh lxmn cx kanjt has been encoded usi

Question: a) Differentiate between ‘Gross Settlement' and ‘Multilateral Net Settlement' providing suitable examples where necessary to support your answer. b) Differentia

(a) Consider the subsequent authentication options: A. Using password. B. Using pin and fingerprint Which option A or B provides stronger security and why? (b) Give

Question: (a) Prove that every positive integer n can be factorized into a product of prime powers. (b) State the Fermat-Euler theorem as needed in the RSA system. (c) Us