Presentation on theme: "Honeypot Group 1E Zahra Kamali (KAMZY001) Pratik Doshi (DOSPY001) Tapan Dave (DAVTH001)"— Presentation transcript:
Honeypot Group 1E Zahra Kamali (KAMZY001) Pratik Doshi (DOSPY001) Tapan Dave (DAVTH001)
Honeypot A honeypot is a security resource whose value lies in being probed, attacked, or compromised Honeypots can be used to catch hackers while they are in the network and to redirect hackers from the actual production systems to the honeypot system. Current intrusion detection systems are not designed to collect and protect the integrity of the type of information required to conduct law enforcement investigations.
Risks avoid that system, penetrate the organization’s network and attack other innocent production systems. spoof the other production systems in the network
Evidence By using Honey pot it can be proven that that a computer/attacked was involved that it was accessed Fact of unauthorised access
Advantages & Disadvantages Advantages Prevention Detection Information Gathering Disadvantages Limited field of Vision Discovery and Fingerprinting Risk of takeover
Recommendation Honeyd open source can emulate entire network on a single host runs multiple services simulates operating system
Your consent to our cookies if you continue to use this website.