Verified Document

Honey Pots Over The Last Several Years, Term Paper

Honey Pots Over the last several years, the issue of security has been increasingly brought to the forefront. This is because more hackers are able to successful breach different security protocols. Recently, honeypots have evolved to protect against these kinds of challenges. This is a system which is set up on the Internet to attract those who are trying to breach other computers or servers. (Spitzner, 2010)

To fully understand how this is utilized requires carefully examining the different types. This will be accomplished by focusing on the various kinds, the benefits of using a virtual machine for implementation and the resources need to set them up. Together, these elements will offer specific insights on the benefits of using honeypots. (Spitzner, 2010)

Research two different honeypots that are available to use free or open source.

The first type of honeypot is Honeyd. This is an open source application which is easy to deploy and can be uploaded mainly to a Linux-based operating systems. It is...

This is because hackers will search for any kind of backdoor solution to gain access to the database. One way they are able to do this is through scanning all of the IP addresses that are available. When a Honeyd detects this, it isolates the threat and alerts the webmaster that an attack is in progress. This limits the ability of hackers to breach these vulnerabilities and mitigate any kind of threats early. In this case, Symantec was selected utilizing a pure honeypot. (Spitzner, 2010) (Whitman, 2009)
The second kind is a Bubblegum Proxy Pot. This is an open source solution which is designed to deceive and detect spammers by providing them with a list of IP addresses for them to go through utilizing http connects. The basic idea is to slowdown their ability to access the site and obtain information about vulnerable areas. This is a low interaction honeypot and it was selected from Digiater. ("Overview," 2011) (Whitman, 2009)

Discuss the benefits of…

Cite this Document:
Copy Bibliography Citation

Related Documents

Espionage Study Guide
Words: 9330 Length: 34 Document Type: Essay

Espionage Burds, Chapter 19 Golden Age of Soviet "Illegals" Cambridge Five: Burgess, Blunt, Maclean, Philby and Cairncross These five were all discovered to be spying for the Soviets. Cairncross was never caught. He supplied Stalin with secrets that helped the Soviets stay ahead of British Intelligence, especially at the Battle of Kursk Cairncross also informed Stalin of ULTRA, when Churchill was hiding ULTRA from Stalin Cairncross supplied a total of 5832 documents to the Soviets Cairncros had been

Japan's Economic Crisis Following the United States
Words: 3561 Length: 11 Document Type: Term Paper

Japan's Economic Crisis Following the United States terrorist attacks on September 11 and the outbreak of mad cow disease, economic analysts are predicting the onset of a deepening recession in Japan. Some are even referring to the possibility of a depression in the world's second largest economy, due to the global economic downturn. Recently released surveys of future trends together with economic data recording economic performance over recent months point at least

Mbuti Pygmies of the Ituri Forest the
Words: 2795 Length: 8 Document Type: Research Paper

Mbuti Pygmies of the Ituri Forest The Mbuti pygmies are a nomadic tribe who inhabit the southern and central portions of the Ituri forest, in the Republic of Congo. They are an ethnocentric and homogenous society whose traditions, gender relations, kinship, social organization have remained unchanged until the last fifty years. The Mbuti tribe is divided into two sub-groups, the Efe and the Mbuti. Currently there are between 20,000 and 50,000

America's Diet
Words: 3416 Length: 13 Document Type: Essay

America's Diet The typical American diet is one high in sugars and processed foods. Accordingly, The United States has earned the unfortunate nickname of "Fast-food Nation." The initiation of the rapid growth in fast-food consumption rates in America is likely a result of this country's lack of a widely embraced and highly diverse national cuisine. The United States as a country is truly a melting pot for cultures, religions, ethnicities and

Feminist Themed Fairy Tale
Words: 2272 Length: 8 Document Type: Essay

grand cycle is never ending. The series of creation, existence, and destruction, from the first moments of the big bang, to the empty, icy death of the universe never stops. Just like a circle with no end or beginning, the universe spreads and collapses, condenses and ignites repeatedly. How many universes exist and whether or not they interact or fuel each other is unknown. What is known is a

Network Security
Words: 3307 Length: 10 Document Type: Research Paper

Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now