Assignment 5

.docx

School

American Public University *

*We aren’t endorsed by this school

Course

ISSC452

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by AmbassadorHummingbirdPerson531

Report
Debating the Use of Honeypots Kyle Namen American Public University Cybersecurity ISSC452 Dr. Ron L. Booth 12/07/2023
2 Honeypots are a sophisticated security technique that involves deploying decoy servers or systems alongside actual production systems. The primary objective of these decoys is to attract potential attackers, while allowing IT teams to monitor the system's security responses and redirect the attacker away from the actual target (Lutkevich, 2021). Tailored honeypots can be set up according to specific organizational needs to act as traps, appearing as bona fide targets and enabling organizations to detect attacks early on and respond appropriately. They can also divert attackers away from critical systems while gathering critical intelligence about the attack type and the attacker's methods. For honeypots to be effective, they must look like legitimate systems, running the same processes as the actual production system and containing decoy files that the attacker will perceive as suitable for the targeted processes (Lutkevich, 2021). To enhance network security, it is often recommended to position the honeypot beyond the firewall. By doing so, security professionals can investigate threats that have successfully infiltrated the firewall and thwart any potential attacks that may originate from a compromised honeypot. Honeypots are designed to entice attackers to engage with them. For instance, a honeypot may feature ports that are susceptible to port scans, enabling attackers to identify open ports on the network. This approach allows security teams to monitor attacker behavior and tactics while highlighting vulnerabilities (Mailgun, 2022). An important piece of information about honeypots that someone who is against them may point out is that there is a possibility of legitimate traffic getting directed to the honeypot instead of the production systems. This is unlikely, however, because the honeypot is separate, it would have to be misconfigured to receive regular traffic (InformIT, n.d.). Additionally, people will say that they are not effective because of the narrow scope that the honeypot utilizes. It is significant to note that honeypotting is different from other types of security measures in that it is
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help