Network Security Honeypots Information Technology Essay




Honeypots and honeynets are popular tools in the field of network security and network forensics. The deployment and use of these tools are affected by a number of technical and legal issues, which should be carefully considered. In this article, we outline the privacy issues of honeypots and honeynets regarding their technical aspects. As an active defense technology, Spitzner 2003 honeypot technology is essentially a technique to deceive attackers by using certain hosts, network services or information as bait. Information security is generally the process of protecting the availability, privacy and integrity of information. Business entities and individuals are based on information stored in a computer database. Such information may include personal personnel data, marketing and sales information, customer lists, accounts receivable lists, salaries and bank details. The strategy follows the classic security paradigm of 'Protect, Detect and React'. In other words, try to protect the network as best you can, find any flaws in that defense, and. The results showed that in the small network the proportion of honeypot and no-attack actions was higher. 20. 52 While in the medium-sized network the share is honeypot and no-attack.





Please wait while your request is being verified...



68330687
8125523
5968138
33523567
93117373