Monday, June 10, 2019
Identification & Authentication in your organization Essay
Identification & Authentication in your organization - Essay Examplem of anomaly detecting systems, have been identified by ICT professionals and scholars as extremely robust and potentially valuable because of their capacity to identify previously unfathomable intrusions or attacks. Even though the research literature is largely supportive of the implementation of honeypots as a supportive, rather than stand-alone, security system, our ICT director asserted that decisions should be based on a cost-benefit analysis. This is precisely what this paper will seek to do. Following a definition of honeypots, their advantages and disadvantages will be discussed in relation to our telephoners needs to localise the efficacy of their implementation.Honeypots are new security technologies that, while not a replacement for traditional intrusion catching systems, address some of the weaknesses of intrusion detection systems (Spitzner, 2003). As their only purpose is to be attacked, all traff ic to the honeypot can be considered an intrusion or an anomaly of some sort. For this reason thither is no need to separate normal traffic from anomalous this makes any data collected from a honeypot of high value. Added to that, since honeypots have no action value, no resource or person should be communicating with them, and therefore any activity arriving at a honeypot is likely to be a probe, scan, or attack. Their value comes from their potential ability to capture scans, probes, attacks, and other malicious activity (Spitzner, 2003).Determining whether or not honeypots should be implemented in our company is dependant upon an assessment of our companys needs. According to our ICT director, among the most important of the network security challenges we confront are the prevalence of internet worms, protection against unknown security holes and related viruses and the deciphering of security data logs for determination of the source of an attack, or attempted hack. A review of the functions of honeypots indicates that they address our
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.