Question

in your own words: Discuss, in a minimum of 100 words, the potential benefits and drawbacks...

in your own words: Discuss, in a minimum of 100 words, the potential benefits and drawbacks of using honeypots on a network. Consider if the use of a honeypot may inadvertently give an attacker a critical piece of information about a network, and whether such a risk outweighs the advantages.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Honeypots:

Honeypots are interesting since they permit a security analyst to see and record what activities a malicious user takes on a compromised computer without necessarily interfering or revealing to the attacker that they are being observed. Since of this invisibility, important insights can be accumulated almost the actual strategies of an attacker. A honeypot can be designed to be either proactive or responsive to attacks, depending on the requirements of the individual who set it up.

Advantages:

There are many benefits that a company can essentially get out of designing a honeypot inside their framework. Whereas there are many solutions to security issues that are available within the computer program market, honeypots still have interesting benefits and really useful purposes. The benefits may well be summarized in the following points:

  • Any attacks may well be effectively captured using honeypots. Also, data around the attack type may be recognized such that shortcoming focuses gotten to be well known to the security administrators. This may be found utilizing the logs which are made by a honeypot.
  • Administrators become essentially familiar with new threats and cutting edge strategies of attacks. They take notice of the new attacks and assist pick up information of how to guard a system against these attacks.
  • When a honeypot captures traffic, it does not capture the complete activity such that it gets to be bulky and tedious to analyze and examine through its captured traffic. On the other hand, it only takes care of the approaching malicious activity and informs the network administrator of it.
  • From the above-mentioned point where we talked about that as it were malicious traffic gets captured by a honeypot, there's no require for a gigantic sum of storage at all. In practice, any devoted computer may gotten to be the honeypot system without an critical got to purchase numerous more assets and distribute budget to convey the honeypot technology inside an organization.
  • The configuration of honeypots is very simple and deploying it does not have any complications. This is often complemented with a basic algorithm that does not have any complexity.

Disadvantages:

  • Everything in life has advantages and drawbacks, and we need to discover the balance between them . In reality, there are a few points that may be considered as pitfalls for utilizing honeypots in common.
  • Information is only gathered when attack is performed. On the other hand, in case there's no attack occurring on the network, at that point there will be no gathered information at all.
  • The captured malicious activity is only collected when the attack is focused on at the honeypot machine. In any case, in the event that the target of the attack was another machine instead of the honeypot machine, at that point we are in truly big trouble.
  • Honeypots are sometimes recognizable from other real systems that we have in our network. Of course, typically a enormous issue that can be handled such that indeed experienced programmers cannot recognize between honeypot systems and real systems utilizing fingerprinting.

---------------------------------------------------------------------------------------------------------------------------------------------------------------

A really undesirable result is that a not careful organization may end up having lies truly within the fact that an attacker may depend on a honeypot and abuse it as a zombie to attack other frameworks inside the network and get them compromised, causing truly huge trouble for the complete organization.

Once the honeypot is accessed, it may be utilized as a launchpad for forthcoming attacks. Those attacks may be conducted on an internal system or on another company. Honeypots, hence introduce risk. There's subsequently an issue of legal liability. In the event that your honeypot is utilized in an attack on another business, you'll be sued. The level of risk that it presented will depend on the honeypot. Typically, the more complex the honeypot, the more noteworthy the risk is likely to be.

-------------------------------------------------------------------------------------------------------------------------------------------------------------

Hope it helps. Please upvote if you are happy with the answer

Add a comment
Know the answer?
Add Answer to:
in your own words: Discuss, in a minimum of 100 words, the potential benefits and drawbacks...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • In a minimum of 150 words explain in your own words what you understand about Keynesian...

    In a minimum of 150 words explain in your own words what you understand about Keynesian Theory. Make sure you are using your own understanding. Pretend you are explaining this to your Parents after class, and you are very excited about the new information you have acquired

  • In your own words, describe the concept of “unconditional positive regard.” Discuss why it’s an important...

    In your own words, describe the concept of “unconditional positive regard.” Discuss why it’s an important aspect of person-centered therapy, including the potential impact of unconditional positive regard on the client and the psychotherapy relationship. How might this concept be applied in your own life with family, friends, partners, etc. and what may be the benefits?

  • In your own words, describe and discuss the three most important legal issues in human resources...

    In your own words, describe and discuss the three most important legal issues in human resources management. What will you do as a manager about to deal with these three important issues? (150 words minimum). Grade will be based on length of response, extent to which the question was answered effectively, and proper use of grammar, sentence construction, and punctuation.

  • Topic: Construction/Safety/Total Quaility Management (Briefly discuss in your own words, 1 paragraph minimum) 1) How does...

    Topic: Construction/Safety/Total Quaility Management (Briefly discuss in your own words, 1 paragraph minimum) 1) How does Total Quality Management (TQM) relate to Safety Programs? 2) How would you as a Safety Professional or manager enhance safety in the construction industry by using TQM?

  • IN YOUR OWN WORDS. 100 words for each question. read the article attached and answer. Discuss...

    IN YOUR OWN WORDS. 100 words for each question. read the article attached and answer. Discuss the importance of confidentiality, integrity and availability. Discuss some of the pertinent principles in health informatics ethics Based on you information provided on confidentiality, integrity, availability, and ethics, discuss what would you do as the resident physician and explain why. CHAPTER 2 Ethical Decision-Making Guidelines and Tools Jacqueline ). Glover, PhD Scenario 2-A Decision Making for an Adolescent M Learning Objectives After completing this...

  • Please answer the followings Questions in 550-words count in your own words. Please provide a spreadsheet...

    Please answer the followings Questions in 550-words count in your own words. Please provide a spreadsheet with calculation and loss estimates and capital. The board of directors of your for-profit hospital has been approached by a nonprofit hospital to consider a joint venture to take over their business resulting in a larger for-profit medical center status. You have been asked to construct a financial risk analysis for this conversion. Using course materials, including your text and the Internet, and principles...

  • Questions: 1. What is e-waste? What is so dangerous about e-waste? Many well-meaning individuals thought that...

    Questions: 1. What is e-waste? What is so dangerous about e-waste? Many well-meaning individuals thought that recycling was the answer to the e-waste problem. But why hasn't e-waste recycling yielded the results hoped for? 2. What are network effects? Think about the kinds of technology products that you own, or websites you use, that are subject to network effects. What sorts of exchange do these products leverage (e.g., information, money, software, or other media)? Give several concrete examples and explain...

  • Define (in your own words) business model. what is a business model? Gives Examples 2. Define...

    Define (in your own words) business model. what is a business model? Gives Examples 2. Define (in your own words) business model. What is a business model? Give examples. • Remove this instructional/explanatory text before submitting assignment. • Use this slide (or create 1-4 additional slides) to define business model – what is it? Make sure you provide examples. This is NOT a data dump, so do NOT fill these slides with an overload of data. Your job is to...

  • I want to redraft the solution, using other words , use your own words don't copy and paste.. don...

    I want to redraft the solution, using other words , use your own words don't copy and paste.. don't use handwriting.. Q1. To what extent is Hootsuite's use of social media consistent with recommendations about matching the richness of media to the situation at hand? Q2. How does Hootsuite's use of social media tend to eliminate barriers to communication? Explain. Q3. Which of the downsides to social media are occurring at Hootsuite? Explain. Q3. What are the primary benefits of...

  • Please answer the following question in 500 word count in your own words Please cite all...

    Please answer the following question in 500 word count in your own words Please cite all reference The board of directors of your for-profit hospital has been approached by a nonprofit hospital to consider a joint venture to take over their business resulting in a larger for-profit medical center status. You have been asked to construct a financial risk analysis for this conversion. Using course materials, including your text and the Internet, and principles of financial risk analysis, evaluate the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT