Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

ETHICAL HACKER CLASS: After conducting a thorough security test on the Alexander

ID: 3885916 • Letter: E

Question

ETHICAL HACKER CLASS: After conducting a thorough security test on the Alexander Rocco network, you have identified several intrusion attempts from sources over the Internet. The hackers haven’t gained access to the internal network yet, but you’re concerned that it’s only a matter of time before the attempts become successful. Based on this information, write a two-three pages report describing:

Task 1: What can be done to attract intruders and keep them connected to the network long enough to trace them.

Task 2: The report should discuss the pros and cons of using this strategy and mention any legal issues the company might face.

Task 3: Include your recommendations for configuring or revamping the network to defend against four types of threats. Task 4: The report must mention standard tools, security devices and software packages to be used.

Explanation / Answer

Task1:

With the expanded availability of PC frameworks, the development of the Internet and the uplifted suspicion that all is well and good, there is almost certainly that, the requirement for security countermeasures is imperative for ensuring association's frameworks and information.Honeypots alone can't explain framework security issues; they are simply devices that supplement the customary system gadgets.

The Honeynet Project, a non-benefit association of thirty-security experts lead by Lance Spitzner, is devoted to taking in the devices, techniques and plan of intruders.The gathering, established in April of 1999, shares its data with the security group.

WHAT ARE HONEYPOTS?

A honeypot can be characterized as any gadget "intended to pull in gatecrashers so their exercises can be checked without hazard to creation frameworks or information" (E. Eugene Shultz,September 22, 2000).The honeypot lures blackhat aggressors and look at them as they abuse vulnerabilities inside the "imitation" system.Honeypots don't really supplant any of the other beforehand specified, customary security devices.They are like a standard IDS yet with more concentrate on trickiness and data gathering.

Task2:

Advantages

• Honeypots can go about as discouragement to interloper attacks.Knowing that a framework is set up to catch and log all exercises may frighten off would be gatecrashers.

• It can deliver measurable confirmation that is acceptable in an official courtroom. Many individuals think a honeypot is entrapment.As long as it is sent accurately and is definitely not publicized, it can be utilized as lawful confirmation.

Disadvantages

• Intruders can utilize honeypots to trade off different frameworks on an association's system and on the Internet.This can prompt lawful ramifications for the associations that possess the honeypot framework.

• Honeypots can add multifaceted nature to a system. Contingent upon how it is conveyed, it might expand security multifaceted nature and increment presentation to misuses.