Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Using your textbook, the Internet, and any other suitable references, answer the

ID: 3860262 • Letter: U

Question

Using your textbook, the Internet, and any other suitable references, answer the following questions in your own words. Save your answers in a single file and attach it to this assignment. Remember to include any sources that you use. Each answer should be a decent paragraph (about 6 senteces, 250 words each, double spaced, APA format).

*Why would a database administrator set up a honeypot?

*What role does a firewall play in a honey pot design?

*What is the difference between hashing a password and encrypting it?

Explanation / Answer

database administrator set up a honeypot:

A honeypot is a system that is set up with the singular purpose of being attacked.

The fake environment which includes false data to mislead intruders whoare attempting to gather information about the database is known as honeypot.

The purpose of honeypot is to gather information of the intruder of the system.

Honeypot alone doesn’t form a security system, just acts as an extra level ofsecurity system.

The main focus of a honeypot is on information gathering and deception.

Honeypot and IDS are variants to each other.

Honeypot can be deployed

Honeypots are capable of detecting and capturing new attacks irrespective of thetactic used.