Skip to content
Emma Gillespie

Emma Gillespie

  • Home
  • About
  • Contact
  • More

    Networking Questions

    Blog questions and answers

    September 17, 2017October 9, 2017 by emmagillespieblog

    Information references for honeypots

    http://searchsecurity.techtarget.com/definition/honey-pot https://en.wikipedia.org/wiki/Honeypot_(computing) http://ceska-posta.info/honey-pot-security https://www.computerworld.com/article/2573345/security0/honeypots–the-sweet-spot-in-network-security.html https://homes.cerias.purdue.edu/~kaw/research/honeynet/HoneynetTutorial/honeypots/procon.html

    October 30, 2017October 30, 2017 by emmagillespieblog

    Honeypot advantages and disadvantages

    Honeypots have been proven by security experts to succeed in areas that other IDS’ fail. Honeypots will only gather data if an interaction is taking place. the… Read more “Honeypot advantages and disadvantages”

    October 30, 2017November 13, 2017 by emmagillespieblog

    Different types of honeypots

    There are two main types of honeypots: research and production. Production honeypots are situated within networks alongside various other production servers as part of a decoy in… Read more “Different types of honeypots”

    October 30, 2017November 13, 2017 by emmagillespieblog

    A honeypot’s nature

    They are generally made up of a computer, data and different applications which enable it to act and appear as though it is a real system within… Read more “A honeypot’s nature”

    October 30, 2017November 13, 2017 by emmagillespieblog

    What is a honeypot?

    It is a system which is programmed to behave as a decoy for hackers. They also notice, divert and learn various attempts at obtaining unapproved access to… Read more “What is a honeypot?”

    October 30, 2017November 13, 2017 by emmagillespieblog

    Cryptography continued

    Blog Entry: Cryptography   What is Public Key Infrastructure (PKI)? Add a picture to support your answer. It supports the dispersal and recognition of public encryption keys… Read more “Cryptography continued”

    October 30, 2017 by emmagillespieblog

    Cryptography

    In relation to cryptography give clear explanations of the following terms: Plaintext, Cipher Text, Encryption, Decryption, Encryption Key, Encryption Algorithm. Plaintext – this is the information that… Read more “Cryptography”

    October 23, 2017 by emmagillespieblog

    Viruses and Malware

    Area 1 for Blog Entry: Viruses Q1. List 3 types of Virus categories along with some text describing each. Rootkit – this is a collection of software… Read more “Viruses and Malware”

    October 9, 2017 by emmagillespieblog

    Recent Posts

    • Information references for honeypots October 30, 2017
    • Honeypot advantages and disadvantages October 30, 2017
    • Different types of honeypots October 30, 2017
    • A honeypot’s nature October 30, 2017
    • What is a honeypot? October 30, 2017
    Blog at WordPress.com.
    Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
    To find out more, including how to control cookies, see here: Cookie Policy
    • Subscribe Subscribed
      • Emma Gillespie
      • Already have a WordPress.com account? Log in now.
      • Emma Gillespie
      • Subscribe Subscribed
      • Sign up
      • Log in
      • Report this content
      • View site in Reader
      • Manage subscriptions
      • Collapse this bar
    Design a site like this with WordPress.com
    Get started