Tuesday, October 8, 2019

Honeypots and Firewalls Assignment Example | Topics and Well Written Essays - 500 words

Honeypots and Firewalls - Assignment Example hen services needs to be deliver through proxy whereas a multiple screen subnet can be deployed where packages or packets are required to pass through the network into the grid (Zwicky, Cooper and Chapman, 2000). Worms, malware, and viruses are common issues facing companies every day. These can be prevented through the use of antiviruses. An antivirus is software that identifies threats and hence blocks them from attacking a computer, an antivirus is also able to delete viruses, worms, and malware that has already attacked a computer system. Worms, viruses, and malware are sometimes used by hackers to illegally access other peoples’ computers. Ensuring all computers within an organization is therefore important as it will prevent unauthorized individuals from accessing private and confidential information in other peoples’ computers. The value of a honeypot can be sold to a CIO through elucidating its benefits, values, as well as the potential issues and downsides. Based on its simple design, a honeypot has the capability to gather and assemble trivial and minute cliques and arrays of statistics and information. Honeypots are created with the main objective of intermingling and networking with aggressors of the system. Therefore, through assembling and gathering each and every information and statistics, novel gizmos used by hackers and other attackers are identified and dealt with amicably. One of the downside off a honeypot is the fact that it can only identify threats that networks or associates with it. Honeypots can also be hijacked by aggressors and hence be used to cause more damage to the system (The Government off the Hong Kong Special Administrative Region, 2008). There are diverging characteristics associated with firewalls and honeypots. According to Zwicky, Cooper and Chapman (2000), a firewall is characterized by diverse security ranks on the basis of the position and situation of the computer, security or safeguarding of wireless grids and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.