Presentation is loading. Please wait.

Presentation is loading. Please wait.

Honeypot Group 1E Zahra Kamali (KAMZY001) Pratik Doshi (DOSPY001) Tapan Dave (DAVTH001)

Similar presentations


Presentation on theme: "Honeypot Group 1E Zahra Kamali (KAMZY001) Pratik Doshi (DOSPY001) Tapan Dave (DAVTH001)"— Presentation transcript:

1 Honeypot Group 1E Zahra Kamali (KAMZY001) Pratik Doshi (DOSPY001) Tapan Dave (DAVTH001)

2 Honeypot A honeypot is a security resource whose value lies in being probed, attacked, or compromised Honeypots can be used to catch hackers while they are in the network and to redirect hackers from the actual production systems to the honeypot system. Current intrusion detection systems are not designed to collect and protect the integrity of the type of information required to conduct law enforcement investigations.

3 Risks avoid that system, penetrate the organization’s network and attack other innocent production systems. spoof the other production systems in the network

4 Evidence By using Honey pot it can be proven that  that a computer/attacked was involved  that it was accessed Fact of unauthorised access

5 Advantages & Disadvantages Advantages  Prevention  Detection  Information Gathering Disadvantages  Limited field of Vision  Discovery and Fingerprinting  Risk of takeover

6 Recommendation Honeyd  open source  can emulate entire network on a single host  runs multiple services  simulates operating system


Download ppt "Honeypot Group 1E Zahra Kamali (KAMZY001) Pratik Doshi (DOSPY001) Tapan Dave (DAVTH001)"

Similar presentations


Ads by Google