To what extent do you agree or disagree with this statement? Honeypots are an ethical way of identifying illegal activity on the Internet - Essay Example

Only on StudentShare

Extract of sample
To what extent do you agree or disagree with this statement? Honeypots are an ethical way of identifying illegal activity on the Internet

Lance Spitzner (2002), project HoneyNet founder, defines Honeypots as “a security resource whos value lies in being probed, attacked or compromised,” which implies that when a system is designated as aHoneypot, the target is to get it exploited, delved and attacked. The idea is to falsely present the system as available for being probed so that the administrator could evaluate its weak areas and the hacker can be traced. Since Honeypots only act like live systems and do not contain live data therefore, the intruder can never comprehend that the network is fake. This aspect, however, paves the way for ethical concerns since Honeypots involve making the systemvulnerable to outside attacks. The strategy of entrapment that Honeypots entail has also becomes controversial matter. However, Honeypots has its fair share of pluses and minuses, which are described below.
1. Honeypots inform about the shortcomings in security systems. Usage of Honeypots although poses a threat to the system but from a long-term perspective it can encourage introduction of more secure, effective and alert security systems. Scottberget al., assert that “tracking an intruder in a honeypot reveals invaluable insights into attacker techniques and ultimately motives so that production systems can be better protected. You may learn of vulnerabilities before they are exploited” (2002, pp. 388).
2. Kurt Kleiner(2005) believes that Honeypots are advantageous for information systems because of their ability of containing and/or fighting viruses. Honeypots can be considered as healing hubs that “would attract a virus, analyse it automatically, and then distribute a counter measure” (Kleiner 2005).
3. Mark Edmead(2002) considers Honeypot as beneficial because in comparison to IDS (Intrusion Detection System) it only collects small data, which limits the network bandwidth requirement as well as the amount of data to be ...
Download paper


With blessings comes bane and as far as the virtual world, that is the Internet, is concerned hacking and illegal retrieval of personal or organizational data is the main issue that has been plaguing it since its advent. In this respect, several tools have been introduced for…
Author : ufadel

Related Essays

Ppaper on Illegal Physical or Internet Intrusion
This paper discusses why data security is of importance to an organization. Furthermore it throws light upon what might be the physical or internet based threats to an organization’s database and lastly converges with a few suggestions that can be embedded in order to strengthen database security. WHY IT IS IMPORTANT TO SECURE AN ORGANIZATION’S DATA? An organization’s data is of imperative importance to it. The success of any setup is directly proportional to the security and integrity of that environment. This study is aimed at discussing the scope of threats that an organization faces...
5 pages (1255 words) Essay
Explain how the Internet has aided criminal activity.
Violating and offending the laws are also the crimes, but elevated technology increased the crime rates. Hacking is also most known crime in the current era of technology. This crime can be done anywhere in anytime. A computer is used to hack the bank, firm and houses by using the hacking skills. A new user of the internet is the target of the phishing. Hackers create the webpage that is identical to the shopping website. In the next, the hacker sends the link of the webpage to random users via emails. If a hacker is skilled the email is created similarly to the original format of the email....
3 pages (753 words) Essay
Internet crimes
It is becoming common to see it on the news or listening to people complaining that they found some purchases on their credit card bills that they know nothing about and never bought them. The past week CNN showed a report about Sara who was send to life in prison; because she was a leader of global organization, committing crimes through the Internet by stealing credit cards ,stealing government secret information, selling weapons to terrorist groups and selling drugs around the world. Slowly the members of the organization started to fall one by one, it took a long time because they were not...
6 pages (1506 words) Research Paper
To what extent is internet banking safe?
Hackers look for online retailers with large customer base and poor security to obtain their usernames and passwords to access their financial information. Most customers fall prey to emails that appear to be send by their bank but steal the customers’ passwords by leading them to fraudulent websites. Keylogging is a process through which all strokes of a password are tracked by a virus while the password is being entered. It can breach personal computers’ defences. Ordinary web users can fend off such software with having latest versions of anti-virus software installed and extra-thick...
4 pages (1004 words) Essay
Ethical Issues Facing Internet Technology
The print media have undergone a facelift by adapting website technology and blogging. Human interactions have been redefined by social networking, internet forums and instant messaging. Online shopping is another major boon from the internet technology. However, something with a positive effect will have a negative side too. However, as Williamson, Clow, Walker and Ellis (2011) point out, these technological advancements in information and technology have resulted in negative effects of which raise various ethical questions with regard to the Internet. This paper discusses the ethical issues...
5 pages (1255 words) Essay
Group Activity .
The inferences and the observations that are arrived at are always in relation to the position of the head (Azevedo and Aleven, 114)....
2 pages (502 words) Essay
The Database Approach is more beneficial to businesses compared to traditional file-based systems...” Discuss, making references to specific business examples, the extent to which you agree and/or disagree with this widely held view
Database allows access to multiple users at one time whereas a file processing system only allows limited access. At this particular level, the file processing system imposes much more restriction than the database. The businesses that use database may easily impose the uniform standards over important data as the data can be easily formatted to fix into a particular screen. The applications of the database are much easier and quicker to develop because of the standardized components....
3 pages (753 words) Assignment
Got a tricky question? Receive an answer from students like you! Try us!