Information Security And Security Research Paper

PAGES
12
WORDS
1820
Cite

¶ … Honeypot and Honeynet Emerging Technologies In the present IT environment, individuals and businesses are becoming more dependent an open network that includes the Internet where business transactions, government services and commercial activities are realized. However, the use of open network has led to the development of new information security issues and cyber threats that are being utilized by the cyber criminals. Thus, a mistrust in computer network technologies and telecommunications can affect socio-economic of global enterprises, an increase in the complexity of network infrastructures and communication lead to an increased demand for a new approach to cybersecurity.

Essentially, the threats in the cyber security landscapes are continuously evolving. The reactive and traditional security measures are no more sufficient to protect cyber information infrastructures. Thus, honeypots are the new emerging technology tools focusing in the areas of network forensics and network security, which is effective in enhancing network security of an organization. Honeypots are the emerging information security resources that deliberately allow the computing resources to be compromised, and the attacks are analyzed to learn about the procedures, method, and tools that attackers use to inflict the information resources, and the strategy will assist in developing potent information security tools to counter the attackers in the future. The benefit of a honeypot is that it assists in enhancing a greater understanding of malicious activities in the cyberspace. However, honeynet composes of two or more honeypots being used at the same time.

The objective of this paper is to discuss the honeypot and honeynet tools, which a new emerging technology in the cyber security environment.

A. Method Honeypot Improve Cyber security

In a cybersecurity terminology, the honeypot is referred as computer and information security that assists in detecting and deflecting as well as counteracting an attempt of unauthorized users in the information resources. In other words, a honeypot is the data or network site that appears to be legitimate, however being isolated in order to monitor resources or the values of the attackers. The honeypot consists of a fake operating system with the intention to collect data about the intruders. The operating systems are set up in such a way to make it attractive to an attacker. Although, honeypot may appear vulnerable to an attacker, however, the strategy is to collect valuable information about the attack. The information collected will assist the system administrator to identify the intruders and their...

...

(Sokol et al. (2017) argue that one of the main features of a honeypot is its ability to get as much information as possible about an attacker. For example, a high-interaction honeypot aims to allow an attacker getting access to the real operating systems to assist in collecting information about the nature of the attack. This type of honeypot can also be a research honeypot that aims to gain much information about the attacker such as black hat community, and allows the black hat to penetrate and infiltrate the security systems. The malware honeypots are the other security techniques used to detect malware through a replication process. Moreover, the database honeypot is by using the SQL database firewalls to support the honeypot architecture to make intruders running against the trapped database.
The honeypots consist of three core elements: The data control is used to log and monitor the activities of attackers with the aid of the honeynet technology. The honeypot also consists of data capture that controls the activities of the attacker. The data analysis assists in analyzing all the data collected to enhance a greater understanding of the nature of the vulnerability. The application of honeynets is similar to the honeypots in the sense that they are also the networks that intentional invite attackers to monitor the attackers' activities. The information collected assists in improving the network security. However, honeynets contain one or more honeypots to trap individuals who attempt to penetrate into corporate network systems.

B. Method an Organization can Honeypot Cyber security Technologies

Clark et al. (2014) argue that a honeypot is an effective tool that can be used as a deception tool against an imminent attack. For example, an attacker is bent on exploiting an organizational network with the hope of stealing sensitive information. A corporate organization can fool attackers in making them exfiltrating misleading or false information that looks similar to the corporate information systems. The strategy will make the attackers waste time when collecting the useless information. Thus, it is advisable for an organization to set up an honeypot or honeynet to divert the attention of an intruder from penetrating the real corporate network systems. However, it is critical to mention at this point that the honeypot should contain the useless data and should be kept separate from the corporate network systems. In the IT environment, it is essential for the network or system administrators to collect as much information as possible from an intruder to make them improve the corporate network systems. The best strategy to achieve this goal is to encourage an intruder to breach the security of the honeypots to learn about the viability of the corporate network systems.

One of the benefits of the honeypot is that it will assist an organization to understand the viability of their security systems against an imminent attack. To make honeypot more realistic, the system…

Sources Used in Documents:

Reference

Clark, D., Berson, T., & Lin, H.S. (2014). At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. Washington. National Academies Press.

Sokol, P. Misek, J. & Husak, M. (2017). Honeypots and honeynets: issues of privacy. EURASIP Journal on Information Security. 4.


Cite this Document:

"Information Security And Security" (2017, June 07) Retrieved July 27, 2024, from
https://www.paperdue.com/essay/information-security-and-security-2165648

"Information Security And Security" 07 June 2017. Web.27 July. 2024. <
https://www.paperdue.com/essay/information-security-and-security-2165648>

"Information Security And Security", 07 June 2017, Accessed.27 July. 2024,
https://www.paperdue.com/essay/information-security-and-security-2165648

Related Documents

Security Information security is a primary concern for consumers and businesses. In "IT security fails to keep pace with the rise of cloud computing," the author claims that in spite of the advancements in cloud technology, information security has not kept pace. This assessment is rooted firmly in fact and best practices in the information security industry. Although their analysis is thorough, the authors would do well to point out the

Security Management Information Security Management Managing the information security at a major university is never an easy task, and especially with a team of only ten the complexities and the resource demands can sometimes make the situation seem all but impossible even on the best of days. When the former head of information security management suddenly departs as the result of an FBI arrest -- and when that arrest stems from the

SECURITY Information Security and Risk Management in IT This essay is designed to present and discuss both an assessment of information security and risk management in IT systems and a comparative discussion of important academic theories related to security and risk. In the first section, An assessment, a conceptual framework will emerge including reference to important terminology and concepts as well as an outline of legislation and authorized usage examples. In the

Security at Work Information Security within the nursing fraternity With the advent of consolidated information storage within the nursing fraternity, there has grown the need to have better security and controlled access to such information that may be considered confidential and for the use by the nurse and the patient alone. When anyone wants therefore to have access to the documents I will always need to verify several details just to be

Information Security The discussion below provides answers to questions raised with regard to a case at Greenwood Company A forensic plan of readiness comes with several advantages. If there arises a situation that forces a company to be engaged in litigation, and there is need for digital evidence, e-discovery is of central importance. The laws and rules that govern the e-discovery, such as the Federal Rules of Civil Procedure or the Practice

Security Policy: The information security environment is evolving because organizations of different sizes usually experience a steady stream of data security threats. Small and large business owners as well as IT managers are kept awake with various things like malware, hacking, botnets, and worms. These managers and business owners are usually concerned whether the network is safe and strong enough to repel attacks. Many organizations are plagued and tend to