• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Honeypots in Cyberwar
 

Honeypots in Cyberwar

on

  • 853 views

Honeypots role in Cyberwar

Honeypots role in Cyberwar

Statistics

Views

Total Views
853
Views on SlideShare
853
Embed Views
0

Actions

Likes
1
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • How honeypot can be classify ?Honeypots are classified by the level of interaction they provide to the attackerThere are two type of honeypots :Low-interaction High-interactionIn Low-interaction honeypot Only some parts of (vulnerable) applications or operating systems are emulated by software.Internet worms, like Slammer, and port scans can often be identified by low-interaction honeypotsButIn High-interaction honeypot a full working operating system interact with attacker.The administrators install the OS as they normally would, but then leave it in an unpatched state with popular hacker holeleft open.For instance, installing Windows NT Server 4.0, but leaving it at Service Pack 2 and with IIS 4.0OrA Windows 98 machine with an unprotected shared NetBIOS folder

Honeypots in Cyberwar Honeypots in Cyberwar Presentation Transcript