Data Security using Honeypot System
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2020, Vol 4, Issue 6
Abstract
The internet and computer technology are widely used today to make rapid progress. The increasing use of the internet and computers has led to an increase in information theft attacks. This type of honey pot is used in internet and computer field. This is a great option to use to catch an attack. Records disruptive data at the time of hacking and attacks trades outside the network framework. It can be sent for removal and capture from the attackers genuine targets. In this paper the different types of honey pot and in addition the use of conceivable arrangements in a productive environment is simplye described honeypot is a set of dynamic resistive clamps for safety arrangements. It does not interfere, it keeps a record of the honeypot hacking process tools and the movement of different types of new hacking. Honeypots are used either inside or outside the firewall to determine the process of the interloper and the vulnerabilities within the genuine authentic framework. Rupesh Ananda Mote | Kirti Mule "Data Security using Honeypot System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33418.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/33418/data-security-using-honeypot-system/rupesh-ananda-mote
Authors and Affiliations
Rupesh Ananda Mote
Risk Assessment for Building Construction Sites in Myanmar
In Myanmar, construction industries carry on to become safety first. There are many hazards and risks in construction that can cause employee injuries and illnesses. In order to be safe, risk assessment technique is wide...
Features of Reading as a Process of Communication, Reading as a Goal and Means of Learning
The article says that literally, any periodical or textural reference to reading either asserts or implies that the main function of reading is to convey to the listeners by voice the thoughts and feelings of the writer....
Comparative CFD and Simulative Analysis of Flow Behaviour to Calculate Losses in Different Geometrical Pipes
In order to transport the fluid effectively without suffering much energy loss it becomes very important to understand the frictional losses in fluid flow. And here basically two very crucial types of Losses are discusse...
Effect of Electrical and Non-electrical Parameters on the Performance Measures of Electro-Discharge Machining: A Review
The electrical and non-electrical parameters of EDM influence the performance of EDM. EDM is one of the widely used non-traditional machining process used for machine the hard materials which are difficult to machine by...
Review of Steps Taken by Government for MSME's in Digital India
The MSME sector is also known as growth engine of Indian economy, this sector is playing a major role in country' GDP by its contribution in service sector as well as in manufacturing sector, in many research studies, it...