What is a honeypot

Assignment Help Basic Computer Science
Reference no: EM133954266 , Length: Words Count:750

Assignment:

The task is to write a minimum of 750 words that covers:

  • Your general understanding of what a honeypot is. I don't want a definition, I want to know your opinion on the value of a honeypot and if you see where that line is drawn for you on the value vs risk proposition (If you're unsure, talk about it on Element with your peers or with me, I'll gladly play devils advocate on any stance. And it's okay to think they're not worth it.). Remember our goal in security is to secure and maintain the CIA triad... Honeypots don't directly apply to that end in all cases.
  • Specifics of the purpose and usage of one of the honeypots (doesn't have to be in this image, if you have another one in mind). For instance ADBHoney is a honeypot designed to detect unwanted Android Debugging traffic.
  • How you'd use the honeypot you've chosen in any environment (your choice) and what would be the benefits to that addition?
  • What would have to be configured or changed in other systems to allow the honeypot to function. For instance, if your installing a web-based honeypot then you'd need to forward requests through a reverse proxy to share port 80 traffic on your public IP, register a Domain or sub-domain to point to the honeypot, etc...

 

Reference no: EM133954266

Questions Cloud

Where has the patient been in life : Where has the patient been in life? What does the future hold for this patient? Is there potential for growth into higher stages?
Guarantee protection of patient privacy : For healthcare organizations to function at full capacity, all technological and healthcare systems must guarantee protection of patient privacy.
Discuss ways in which attackers and criminals use encryption : Identify and discuss at least three ways in which attackers and/or criminals use encryption and cryptography to further their goals and objectives.
Explain the differences between mbr and gpt : Explain the differences between MBR and GPT and why you might decide to use one over the other.
What is a honeypot : I want to know your opinion on the value of a honeypot and if you see where that line is drawn for you on the value vs risk proposition.
Distinguish between the four different type of software : List and distinguish between the four different type of software.
What is the lawsuit about : What is the lawsuit about? What does an industrial plant have to do with the Chesapeake Bay some distance away? How can this affect you?
What are the three components of the computer instruction : What are the three components of the computer instruction and what do they do?
How do these products and technologies contribute to society : How do these products and technologies contribute to society? (What are the benefits / what features or capabilities do they provide?)

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd