Wednesday, June 12, 2019

Honeynets implementation Case Study Example | Topics and Well Written Essays - 2000 words

Honeynets implementation - Case Study ExampleTo ascertain the effectiveness of the project in administering the foresaid role, I have done sufficient enquiry about the reliability and convenience of the scheme in managing the task and have found it much viable and efficient. The research done covered a full scope including monitoring and getting feedback with those already with the system. I have also done hypothetical hacking techniques and in all the cases, the project has proved beyond hacking. I therefore strongly recommend the project for your institution to cushion form such possible attempts. Best regards. Executive Summery During the month of February, we received a formal communication to design a system security than would be hackers proof since the existing one was frequently being intruded in. It did not provide a resistant guard to hackers. Following this communication, we designed a study to religious service the company in the following ways I. Keeping intruders out side the production system in disguise while they think they are inside the important production system. II. It recognizes any intrusion attempt. This is because any operation found within it asshole only be from an intruder. III. Cheaper to manage it can be virtually back up as opposed to those that are physically supported. IV. Recognizing and storing the pattern taken by the intruders to help our experts advance a quick counter response. During the month of February, hackers intruded into the production line system of the company. As a result of the intrusion several information were altered within the production system and the company lost very crucial operational and direction data. In this regard, the company is estimated to have lost about $ 150,000. As a result of our in depth feasibility study, we established the following criterion for the system to be adopted a) Can be virtually supported b) It has significantly low cost of maintenance c) It gives the identity of the hackers d) It is difficult to penetrate by hackers In this regard, we want to confidently appeal for companys management to ratify the new security system and engage it for the next six month during which they will observe the number of attempted hacking without success in the main system. It is at this time that it will prove inevitable to avoid. Abstract The need to prevent hackers from succeeding in their quest is one of the investments being done by most of the brass instruments. Organizations do invest in various systems that will ensure that their insider information is not leaked to the unauthorized persons or that the unknown does not manipulate the organizations data. Various systems have therefore been floated in response to the conduct. The lingering question is the viability of the system employed to succeed in the intended purpose, we made a proposal to your organization in this regard where we intended to implement the Honeynet project. Research was done about this p roject in terms of how successful it is and the information self-contained is

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.