Verified Document

Honey Pots Over The Last Several Years, Term Paper

Honey Pots Over the last several years, the issue of security has been increasingly brought to the forefront. This is because more hackers are able to successful breach different security protocols. Recently, honeypots have evolved to protect against these kinds of challenges. This is a system which is set up on the Internet to attract those who are trying to breach other computers or servers. (Spitzner, 2010)

To fully understand how this is utilized requires carefully examining the different types. This will be accomplished by focusing on the various kinds, the benefits of using a virtual machine for implementation and the resources need to set them up. Together, these elements will offer specific insights on the benefits of using honeypots. (Spitzner, 2010)

Research two different honeypots that are available to use free or open source.

The first type of honeypot is Honeyd. This is an open source application which is easy to deploy and can be uploaded mainly to a Linux-based operating systems. It is...

This is because hackers will search for any kind of backdoor solution to gain access to the database. One way they are able to do this is through scanning all of the IP addresses that are available. When a Honeyd detects this, it isolates the threat and alerts the webmaster that an attack is in progress. This limits the ability of hackers to breach these vulnerabilities and mitigate any kind of threats early. In this case, Symantec was selected utilizing a pure honeypot. (Spitzner, 2010) (Whitman, 2009)
The second kind is a Bubblegum Proxy Pot. This is an open source solution which is designed to deceive and detect spammers by providing them with a list of IP addresses for them to go through utilizing http connects. The basic idea is to slowdown their ability to access the site and obtain information about vulnerable areas. This is a low interaction honeypot and it was selected from Digiater. ("Overview," 2011) (Whitman, 2009)

Discuss the benefits of…

Cite this Document:
Copy Bibliography Citation

Related Documents

Mbuti Pygmies of the Ituri Forest the
Words: 2795 Length: 8 Document Type: Research Paper

Mbuti Pygmies of the Ituri Forest The Mbuti pygmies are a nomadic tribe who inhabit the southern and central portions of the Ituri forest, in the Republic of Congo. They are an ethnocentric and homogenous society whose traditions, gender relations, kinship, social organization have remained unchanged until the last fifty years. The Mbuti tribe is divided into two sub-groups, the Efe and the Mbuti. Currently there are between 20,000 and 50,000

Feminist Themed Fairy Tale
Words: 2272 Length: 8 Document Type: Essay

grand cycle is never ending. The series of creation, existence, and destruction, from the first moments of the big bang, to the empty, icy death of the universe never stops. Just like a circle with no end or beginning, the universe spreads and collapses, condenses and ignites repeatedly. How many universes exist and whether or not they interact or fuel each other is unknown. What is known is a

Network Security
Words: 3307 Length: 10 Document Type: Research Paper

Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model

Pessimism in Poetry Pessimism in
Words: 16260 Length: 50 Document Type: Term Paper

" The point made by the poet is similar to the poem above. The reference to John, The Father of our souls, shall be, John tells us, doth not yet appear; is a reference to the Book of Revelations, at the end of the Bible. That despite the promises of an Eternal life for those who eschew sin, we are still frail and have the faults of people. We are still besought by sin

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now