Sunday, May 12, 2019
Honeypots and Firewalls Assignment Example | Topics and Well Written Essays - 500 words
Honeypots and Firewalls - identification Examplehen services needs to be deliver through proxy whereas a eightfold screen subnet can be deployed where packages or packets be required to pass through the network into the power grid (Zwicky, Cooper and Chapman, 2000).Worms, malware, and viruses are common issues facing companies all day. These can be prevented through the use of antiviruses. An antivirus is bundle that identifies threats and hence blocks them from attacking a computer, an antivirus is also able to delete viruses, worms, and malware that has already attacked a computer system. Worms, viruses, and malware are sometimes used by hackers to illegally access early(a) peoples computers. Ensuring all computers within an organization is so important as it will prevent unauthorized individuals from accessing private and confidential information in other peoples computers.The value of a honeypot can be sold to a CIO through elucidating its benefits, values, as salutary as the potential issues and downsides. Based on its simple design, a honeypot has the capability to gather and effectuate trivial and minute cliques and arrays of statistics and information. Honeypots are created with the main objective of intermingling and networking with aggressors of the system. Therefore, through assembling and gathering each and every information and statistics, novel gizmos used by hackers and other attackers are identified and dealt with amicably. One of the downside off a honeypot is the fact that it can only identify threats that networks or associates with it. Honeypots can also be hijacked by aggressors and hence be used to cause more damage to the system (The Government off the Hong Kong redundant Administrative Region, 2008).There are diverging characteristics associated with firewalls and honeypots. According to Zwicky, Cooper and Chapman (2000), a firewall is characterized by diverse tribute ranks on the basis of the position and situation of the com puter, security or safeguarding of wireless grids and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.