To what extent do you agree or disagree with this statement? Honeypots are an ethical way of identifying illegal activity on the Internet

Undergraduate
Essay
Information Technology
Pages 3 (753 words)
Download 0
With blessings comes bane and as far as the virtual world, that is the Internet, is concerned hacking and illegal retrieval of personal or organizational data is the main issue that has been plaguing it since its advent. In this respect, several tools have been introduced for…

Introduction

Lance Spitzner (2002), project HoneyNet founder, defines Honeypots as “a security resource whos value lies in being probed, attacked or compromised,” which implies that when a system is designated as aHoneypot, the target is to get it exploited, delved and attacked. The idea is to falsely present the system as available for being probed so that the administrator could evaluate its weak areas and the hacker can be traced. Since Honeypots only act like live systems and do not contain live data therefore, the intruder can never comprehend that the network is fake. This aspect, however, paves the way for ethical concerns since Honeypots involve making the systemvulnerable to outside attacks. The strategy of entrapment that Honeypots entail has also becomes controversial matter. However, Honeypots has its fair share of pluses and minuses, which are described below.
1. Honeypots inform about the shortcomings in security systems. Usage of Honeypots although poses a threat to the system but from a long-term perspective it can encourage introduction of more secure, effective and alert security systems. Scottberget al., assert that “tracking an intruder in a honeypot reveals invaluable insights into attacker techniques and ultimately motives so that production systems can be better protected. You may learn of vulnerabilities before they are exploited” (2002, pp. 388).
2. Kurt Kleiner(2005) believes that Honeypots are advantageous for information systems because of their ability of containing and/or fighting viruses. Honeypots can be considered as healing hubs that “would attract a virus, analyse it automatically, and then distribute a counter measure” (Kleiner 2005).
3. Mark Edmead(2002) considers Honeypot as beneficial because in comparison to IDS (Intrusion Detection System) it only collects small data, which limits the network bandwidth requirement as well as the amount of data to be ...
Download paper
Not exactly what you need?

Related papers

Ppaper on Illegal Physical or Internet Intrusion
This paper discusses why data security is of importance to an organization. Furthermore it throws light upon what might be the physical or internet based threats to an organization’s database and lastly converges with a few suggestions that can be embedded in order to strengthen database security. WHY IT IS IMPORTANT TO SECURE AN ORGANIZATION’S DATA? An organization’s data is of imperative…
Explain how the Internet has aided criminal activity.
Violating and offending the laws are also the crimes, but elevated technology increased the crime rates. Hacking is also most known crime in the current era of technology. This crime can be done anywhere in anytime. A computer is used to hack the bank, firm and houses by using the hacking skills. A new user of the internet is the target of the phishing. Hackers create the webpage that is identical…
Internet crimes
It is becoming common to see it on the news or listening to people complaining that they found some purchases on their credit card bills that they know nothing about and never bought them. The past week CNN showed a report about Sara who was send to life in prison; because she was a leader of global organization, committing crimes through the Internet by stealing credit cards ,stealing government…
To what extent is internet banking safe?
Hackers look for online retailers with large customer base and poor security to obtain their usernames and passwords to access their financial information. Most customers fall prey to emails that appear to be send by their bank but steal the customers’ passwords by leading them to fraudulent websites. Keylogging is a process through which all strokes of a password are tracked by a virus while…
Ethical Issues Facing Internet Technology
The print media have undergone a facelift by adapting website technology and blogging. Human interactions have been redefined by social networking, internet forums and instant messaging. Online shopping is another major boon from the internet technology. However, something with a positive effect will have a negative side too. However, as Williamson, Clow, Walker and Ellis (2011) point out, these…
To what extent do you agree or disagree with this statement? Honeypots are an ethical way of identifying illegal activity on the Internet
Lance Spitzner (2002), project HoneyNet founder, defines Honeypots as “a security resource whos value lies in being probed, attacked or compromised,” which implies that when a system is designated as aHoneypot, the target is to get it exploited, delved and attacked. The idea is to falsely present the system as available for being probed so that the administrator could evaluate its weak areas…
Group Activity .
The inferences and the observations that are arrived at are always in relation to the position of the head (Azevedo and Aleven, 114).…