expand for answer

Honeynet/Honeypot

A honeypot is an individual computer created to serve as a snare for intruders. An entire network created for this purpose is known as a honeynet.


Similar items:
The term “computer forensics” was coined in 1991 in the first training session held by the International Association of Computer Specialists (IACIS) in Portland, Oregon. Since then, computer forensics has become a popular topic in computer security circles and in the legal community. Like any other forensic science, computer forensics deals with the application of law to a science. In this case, the science involved is computer science and some refer to it as Forensic Computer Science. Computer forensics has also been described as the autopsy of a computer hard disk drive because specialized software tools and techniques are required to analyze the various levels at which computer data is stored after the fact. Computer forensics deals with the preservation, identification, extraction, and documentation of computer evidence. The field is relatively new to the private sector, but it has been the mainstay of technologyrelated investigations and intelligence gathering in law enforcement and military agencies since the mid1980s. Like any other forensic science, computer forensics involves the use of sophisticated technology tools and procedures that must be followed to guarantee the accuracy of the preservation of evidence and the accuracy of results concerning computer evidence processing. Typically, computer forensic tools exist in the form of computer software.
[view]
Similar to a honeypot. When an intruder is detected by an IDS, the intruder is transferred to a padded cell. The padded cell has the look and layout of the actual network, but within the padded cell the intruder can neither perform malicious activities nor access any confidential data. A padded cell is a simulated environment that may offer fake data to retain an intruder’s interest.
[view]
A technique often used on honeypot systems and on critical resources to emulate well-known operating system vulnerabilities.
[view]
One of the most commonly used forms of perimeter security control. The primary purpose of lighting is to discourage casual intruders, trespassers, prowlers, and would-be thieves who would rather perform their malicious activities in the dark.
[view]
The network portion of an IP address. For a class A network, the network address is the first byte of the IP address. For a class B network, the network address is the first 2 bytes of the IP address. For a class C network, the network address is the first 3 bytes of the IP address. In the Internet, assigned network addresses are globally unique.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in