Honeypots You're responsible for the security of Xen Tech Limited a large IT company in Jamaica. Due to a recent increase in cyber-attacks against the companys webserver, the management has suggested that you implement a system to detect and track potential attackers who are trying to break into the network. You decide to set up a honeypot to lure attackers into revealing their tactics and techniques. You desire to configure the honeypot to mimic a vulnerable server that's commonly targeted by attackers and place it on a separate network segment to prevent attackers from accessing your production systems. You also desire to set up monitoring and logging tools to capture and analyze all traffic to and from the honeypot. Tasks: (Be as creative as you can) Write a python Honeypot that listens for incoming connections on multiple ports (22, 80, and 443) and logs any data received. The honeypot should also include additional features such as packet capture, intrusion detection, and alerting. Write a report to share your findings to include source and destination IP addresses captured, any intrusions detect, possible vulnerabilities attackers were targeting and alerts etc Suggest ways to properly secure the honeypot to prevent attackers from using it to attack other systems if the organization is using only layer 2 switches. Bonus Simulate how you would create a VLAN in Cisco Packet Tracer to segment the Honeypot from production systems assuming layer 2 switches are being used..