Activation of the Under-Windows Honey Pot in Presenting a Factitious Networking

Download Now
Provided by: International Journal of Computer Science and Network Solutions (IJCSNS)
Topic: Security
Format: PDF
The extending use of the new technologies, the increasing number of the users, and also the increasing amount of the exchanged data between them, will certainly lower the acquaintance level of the personal elements with this virtual world, and this has caused the companies and the personal users' security to be threatened more and more by extra danger. Security is one of the most complicated and most important current issues of the computer network world. In this paper, in addition to discussing honey pot, a new method to enhance the security level has been presented, which has used a kind of honey pot called honeyed.
Download Now

Find By Topic