NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
honeypot
|
|
NAT
|
|
IPS
|
|
IDS
|
Detailed explanation-1: -Honeypots are placed on decoy servers within the DMZ that appear real to the intruder. They run realistic processes and use common protocols.
Detailed explanation-2: -A honeypot is a security mechanism that creates a virtual trap to lure attackers. An intentionally compromised computer system allows attackers to exploit vulnerabilities so you can study them to improve your security policies.
Detailed explanation-3: -KFSensor is a host-based Intrusion Detection System that can act as a honeypot that is used to attract as well as to detect attackers and worms by simulating vulnerable system services and trojans.
Detailed explanation-4: -Placement of the honeypot Arguably, the ideal place to create your honeypot is in the demilitarized zone (DMZ). This is the area that is out of your main network, but still behind a router which faces the Internet.