Implementation of Honeypot

Provided by: Engineering Research Publication
Topic: Security
Format: PDF
In the IT world, information is considered to be the most valuable asset for any organization in today's times. The ability of an organization to be able secure this asset is a critical factor and the art of securing this asset is known as information security. In today's competitive IT business, network administrators must be competent enough to protect the network and the information on the One of them is Honeypot. Honeypot reduces the overhead of the network administrator which is-'always be on the network and always monitor it'. Honeypot is a setup to imitate a real network.

Find By Topic