Trap and trace systems-information security, Computer Network Security

TRAP AND TRACE SYSTEMS

Trap and Trace Systems use techniques to detect an intrusion and trace it back to its source. Trap comprises of honey pot or padded cell and alarm. The drawbacks to trap and trace
- Enticement: procedure of attracting attention to system by placing the tantalizing bits of information in key locations
-Entrapment: luring an individual into committing a crime to get a conviction.
-Enticement is legal and ethical, whereas entrapment is not.


 SCANNING AND ANALYSIS TOOLS

It is used to collect information that attacker would require to launch successful attack. Attack protocol is series of steps or processes used by an attacker, in a logical sequence, to launch attack against the target system or network.

-Footprinting: organized research of Internet addresses controlled by a target organization
-Fingerprinting is a systematic survey of all of target organization’s Internet addresses collected during foot printing phase. Fingerprinting reveals helpful information about the internal structure and operational nature of target system or network for the anticipated attack. These tools are valuable to network defender as they can quickly pinpoint parts of systems or network that require a prompt repair to close the vulnerability.

Port Scanners

Port scanners are tools which are used by both attackers and defenders to identify the computers active on a network, and other useful information. They can scan for specific types of computers, protocols, or resources or their scans can be generic. The more specific the scanner is, the better it can provides attackers and defenders useful information.

Posted Date: 10/9/2012 4:05:18 AM | Location : United States






Your posts are moderated
Related Questions
Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

Firewalls A firewall in an information security program that prevents specific types of information from moving between the outside world and the inside world. The firewall may

Question : (a) State whether the following statement is FALSE or TRUE: It is always better to have various access points to the Internet so that if a hacker takes one down you

Question (a) Consider that you enter the subsequent URL in the address bar of a popular web client and that both the server and client accepts HTTP version 1.1. i. What can be

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

Hypothetical reliable data transfer protocol: A jumping window based Go-back-N  ARQ protocol for file transfer using UDP as the transport protocol: In this protocol, a window o

Around the globe the bank controlled Co-ops (Visa, MasterCard, Discover, and American Express) have rolled out millions of smart cards under the EMV (Europay, MasterCard, VISA) sta