Home » dissertation examples » 53288841

53288841

Analysis, Security

Battling hackers and technological experts who make use of their understanding for robbing information and hacking may always be bothersome and expensive. Why waste time, effort, strength and risk losing away thousands of dollars in profits. The application of honey planting pots and honies tokens can eliminate the dependence on such hazards and boost the security of the system.

Honey bridal party and sweetie pots aren’t computer systems. Actually they are computer software that is designed to interact with unauthorized users and table their activity. They give you the ability to allow online hackers and crackers into the system and let them feel as if they may have broken into the system. They will hold phony data that may be kept there for that destructive user to use and take. The fishing hole then actively saves all of the actions performed by the illegal user. Using such sweetie pots and combining that with the data on their actions, many potential takeovers may be subdued. Several malicious invasions can be countered using this sort of honey pots, and at the same time, the illegal customer commending in the capabilities upon managing to be able to into the business security.

A honey pot functions by trapping the actions associated with an intruder by simply setting a fallacious database that has honies pots are just software that tackles crackers intelligently without them knowing that they’ve been tracked. The cracker may do whatever they as with data that is certainly as fallacious as dummy data. You cannot find any sensitive data provided to such a cracker as well as the hacker’s actions will be underneath review all the while he is snooping around in the system.

They may be relatively easy to install and do not demand a lot of excessive technological price or monitoring. But they are highly effective in countering illegal break-ins to sensitive data. The moment there is a great access to the device through virtually any undefined approach, the fishing hole gets activated and provides the consumer with directories that is of no use to the firm and is in fact in place to fool the hacker.

Therefore , Mr. Lloyd, given benefits benefits of sugar coating an illegal consumer and then locating the security slots that they found in breaching the system, the company must look into implementing the honey pot program. Using this we could then fix our secureness holes to enable them to stop various other crackers breaching our protection again.

Bibliography

1 . What is honey pot? a description from Whatis. com. Recovered March 17, 2008, via Search Protection Web site: http://searchsecurity.techtarget.com/sDefinition/0,sid14_gci551721,00.html

2 . Dynamic Honeypots Retrieved Mar 17, 08, from Reliability Focus Website: http://www.securityfocus.com/infocus/1731

< Prev post Next post >

Words: 470

Published: 02.14.20

Views: 334