A honeypot is a decoy system that is purposely set in place to lure attackers under the guise of trapping them or gaining information about who they are (Whitman & Mattord, 2011). A typical honeypot could be an unsecured web server that is setup in such a way that it would appear just begging to be compromised. The reality is that, like a Venus fly trap its only goal is to track the IP address of every person who enters without permission. A common use for such a device would be the same as a sting operation used by the police to locate information about groups of people or individuals. Another tactic of installing a honeypot is to better understand the techniques that attackers are using to commit cyber-crime. These scenarios are then used to design future software and help the planning of security (Whitman & Mattord, 2011).
There are many forms that a honeypot can assume; in fact it can represent nearly anything you want to secure. For example, if you wanted to lure people away from your email server you could implement a virtual server that emulated all real data without actually containing any at all. The attack may then assume that there is no need to ...
... middle of paper ...
Grimes, R. (2005). Honeypots for windows. (1st ed., p. 424). New York, NY: Apress Publishing. Retrieved from http://www.apress.com/9781590593356
Jens Grossklags & Jean Walrand (Eds.), Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) (p. 324). New York, NY: Springer Publishing.
Sabu M. Thampi, Pradeep K. Atrey, Chun I. Fan, Gregorio Martinez Perez (Eds.), Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings (Communications in Computer and Information Science) (p. 418). New York, NY: Springer Publishing.
Whitman, M. E. & Mattord, H. J. (2011) Principles of Information Security. Boston: Course Technology. (Whitman & Mattord, 2011)
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- The Escalation of Computer Hacking Crimes The advancement of computer technology makes the world easier place to live by facilitating the fields of science, medicine, and education. Although computers benefit us from many aspects, they also have negative implications. Many criminals use the computer to take or alter data, and to gain unlawful access of computers, by using computer worms, viruses, and Trojans. Which has posed new challenges for the government and the society. Due to the versatility of the computer, drawing lines between criminal and non-criminal behavior regarding its use can be difficult.... [tags: Computer, Personal computer, Malware]
1504 words (4.3 pages)
- Computers have changed our lives in many many different ways. We do a lot of things from computers and our portable devices such as get music, watch videos, pay bills, order dinner, keep connected with friends on social media sites like Facebook or Twitter, take college classes online, and many other things that I could make a 5 page list of all the things it can help us do straight from home but that would bore you to death. Now that I have told you how computers have changed our lives and how they are used in daily life let me tell you the importance of the people working in computers and IT.... [tags: Job, Computer Systems, Career]
932 words (2.7 pages)
- 1.0 Introduction An operating system (OS) is a software program that manages the hardware and software resources of a computer. The operating system is an essential component of the system software in a computer system. The operating system programs make system resources available to user(s), the user’s application programs and to other application programs running on the computer. (From Silberschatz and Gagne et al., 2010) Some operating systems are designed to be convenient, others to be efficient and some combination of the two (From Silberschatz and Gagne et al., 2010).... [tags: Hardware, Software, Computer, Operating Systems]
2389 words (6.8 pages)
- Introduction Computer systems can be found in varying environments, these are; at home, in businesses, computer gaming, networking and real-time situations. Computers systems can be classified into the following categories; microcomputers, minicomputers, mainframes and super computers. Different environments will have certain computer systems which are appropriate for that setting. Microcomputers can be categorised as personal computers (PC’s) and mobile computers. Mobile computers can be devices such as laptops, PDA’s, smart phones and tablets.... [tags: Personal computer, Computer, Mainframe computer]
1500 words (4.3 pages)
- Cyber security is defined as the protection of information on computer systems and the protection of the hardware that supports or stores the information on computers or servers. This level of protection can include controlling physical access to the hardware, as well as protecting against harm that may come from local or remote network access, data and code injection and due to malpractice by system operators, who may have been tricked by outside personnel to place the system in a compromising situation.... [tags: Computer security, Information security, Computer]
833 words (2.4 pages)
- Computer Crimes come in a variety of names and can include hate crimes, telemarketing and internet fraud, identity theft and credit card account theft. These are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the internet. It is very difficult to gauge the amount of damage and/or financial loss that has resulted from computer crimes. Many times the victim does not even know that they have been targeted or even that they are a victim. Those that do realize that they are a victim of a computer crime many times do not report it to the authorities or have no way of knowing what caused them to be a victim in the first place.... [tags: Computer Software Hacking Security]
1710 words (4.9 pages)
- Scenario 1 Sarah’s Flower Designs is a fledgling, home-based business in Madison, Wisconsin, consisting of three employees. Sarah, the owner, handles all of the floral arrangements. Her assistant, Mark, handles the purchasing of flowers, related materials, and takes telephone and walk-in orders from customers. Mark also keeps the financial and client records in order. Kim is the delivery driver and makes local deliveries to homes and businesses. Sarah’s Flower Designs is looking to upgrade its computer system (an older model PC) to help keep up with the growing demand of their customers.... [tags: Computer System Technology]
1171 words (3.3 pages)
- Computer Crimes Computer crimes are a major issue in the world today. They are taken place in people’s home, office, and in lots of places. A person should be very cautious about the type of personal information that they enter on there someone else’s computer as well as there own. These things could come back to haunt you in the future. Criminal activity where a computer or network is the source, target, place or tool of a crime is what we call computer crime. Some other terms for computer crime are cybercime, e-crime, hi-tech crime, and electronic crime.... [tags: Security]
1119 words (3.2 pages)
- Computer Crimes Computer crimes are on the rise 1 in 10 Americans experience some form of a malicious attack on their computer system. If you pay attention to the rest of this speech you will understand how a Hackers mind works and how to defend yourself from them. In this speech I will tell you why and how people break into computers, what sorts of trouble they cause, and what kind of punishment lie ahead for them if caught. Hackers and Crackers break into computer systems for any of a wide variety of reasons.... [tags: essays research papers]
664 words (1.9 pages)
- Computer Crimes Computer Crimes are on the rise in the state of Oklahoma with three of the most common being identity theft, credit card fraud, and computer hacking. A confused caller was having troubles printing documents. He told the technician that the computer was saying that the computer 'could not find the printer.' The user had even tried turning the computer screen to face the printer, but his computer still could not 'see' the printer. Identity Theft Instances of identity theft have increased as the willingness of lenders like issuers of credit cards to extend credit without physical human contact, the ability to transact sales and other business at a distance (online and via t... [tags: Identity Theft]
1054 words (3 pages)