Blog questions and answers
Information references for honeypots
http://searchsecurity.techtarget.com/definition/honey-pot https://en.wikipedia.org/wiki/Honeypot_(computing) http://ceska-posta.info/honey-pot-security https://www.computerworld.com/article/2573345/security0/honeypots–the-sweet-spot-in-network-security.html https://homes.cerias.purdue.edu/~kaw/research/honeynet/HoneynetTutorial/honeypots/procon.html
Honeypot advantages and disadvantages
Honeypots have been proven by security experts to succeed in areas that other IDS’ fail. Honeypots will only gather data if an interaction is taking place. the… Read more “Honeypot advantages and disadvantages”
Different types of honeypots
There are two main types of honeypots: research and production. Production honeypots are situated within networks alongside various other production servers as part of a decoy in… Read more “Different types of honeypots”
A honeypot’s nature
They are generally made up of a computer, data and different applications which enable it to act and appear as though it is a real system within… Read more “A honeypot’s nature”
What is a honeypot?
It is a system which is programmed to behave as a decoy for hackers. They also notice, divert and learn various attempts at obtaining unapproved access to… Read more “What is a honeypot?”
Cryptography continued
Blog Entry: Cryptography What is Public Key Infrastructure (PKI)? Add a picture to support your answer. It supports the dispersal and recognition of public encryption keys… Read more “Cryptography continued”
Cryptography
In relation to cryptography give clear explanations of the following terms: Plaintext, Cipher Text, Encryption, Decryption, Encryption Key, Encryption Algorithm. Plaintext – this is the information that… Read more “Cryptography”
Viruses and Malware
Area 1 for Blog Entry: Viruses Q1. List 3 types of Virus categories along with some text describing each. Rootkit – this is a collection of software… Read more “Viruses and Malware”