Joshi / Sardana | Honeypots | E-Book | www.sack.de
E-Book

E-Book, Englisch, 340 Seiten

Joshi / Sardana Honeypots

A New Paradigm to Information Security
1. Auflage 2011
ISBN: 978-1-4398-6999-4
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

A New Paradigm to Information Security

E-Book, Englisch, 340 Seiten

ISBN: 978-1-4398-6999-4
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics. The book also discusses practical implementations and the current state of research.

Joshi / Sardana Honeypots jetzt bestellen!

Weitere Infos & Material


Honeypots
Background

Honeypots

Honeypots vs. Firewalls and Intrusion

Classification of Honeypots

Placement of Honeypots

Varieties of Honeypots: Honey tokens, Honeypages, Honeynets and Honeyfarms

Value of Honeypots

Risks and Tradeoffs

Key Issues and Challenges
Commercially Available Honeypots
Backofficer Friendly

Specter

Mantrap

Honeyd
Honeynets
Overview of Honeynets

Value of Honeynets

Working of Honeynet

Honeynet Architectures

Sweetening the Honeynets

Risks Associated with Honeynets

Attacks and Role of Honeypots
Phases of Attack and Honeypots

Worms and Virus Attacks

Spam and Phishing Mails

Distributed Denial of Service Attacks

Static Honeypots
Honeypot as Detection Systems

Honeypot as Deception Systems

Virtual Honeypots
Virtual Honeypot: VMware Workstation

Data Capture on Virtual Honeypots

Raw Disks and Virtual Disks
Virtual Honeynet

Case Study

Dynamic Honeypots
Issues with Static Honeypots

Dynamic Honeypots

Dynamic Honeypot Design

Dynamic Honeypot
Construction

Benefits

Wireless Honeypots
Introduction to Wireless Local Area Networks

Basic Wireless Concepts

Security

Wireless Attacks: From A
Blackhat’s perspective

Wireless Honeypots

Limitations

Applications of Honeypot
Defense against automated attacks

Protection against human intruders

Surgical Detection Methods

Cyber-Forensics

Network Surveillance

Forensic Analysis

Tactical Battlefield

Use as Deterrent

Research
Purpose

Anti Honeypot Technology
Network Issues

System Issues

Techniques for Honeypot Detection

Counter-measure for Detection of
Honeypot Deployment

Honeypots and Network Forensics
Network Forensics

Honeypot as Network Forensic Analysis Tools

Honeypot Based Network Forensics
Frameworks



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.