Download presentation
Presentation is loading. Please wait.
Published byMoshe Botsford Modified over 10 years ago
1
Honeypot Group 1E Zahra Kamali (KAMZY001) Pratik Doshi (DOSPY001) Tapan Dave (DAVTH001)
2
Honeypot A honeypot is a security resource whose value lies in being probed, attacked, or compromised Honeypots can be used to catch hackers while they are in the network and to redirect hackers from the actual production systems to the honeypot system. Current intrusion detection systems are not designed to collect and protect the integrity of the type of information required to conduct law enforcement investigations.
3
Risks avoid that system, penetrate the organization’s network and attack other innocent production systems. spoof the other production systems in the network
4
Evidence By using Honey pot it can be proven that that a computer/attacked was involved that it was accessed Fact of unauthorised access
5
Advantages & Disadvantages Advantages Prevention Detection Information Gathering Disadvantages Limited field of Vision Discovery and Fingerprinting Risk of takeover
6
Recommendation Honeyd open source can emulate entire network on a single host runs multiple services simulates operating system
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.