Answered>Order 20845

Please paraphrase the below

What impact would more open ports have on the ability of your honeypot to attract hackers?

Allowing for multiple open ports has a direct impact on the organization, as it will allow the attackers to hack and compromise the systems. Basically, several hackers are looking for certain open ports. However, others are scanning to see if there is an open port. On large organizations with several servers and with a lot of services running on, the attackers will look into and may compromise the system. In addition, the honeypot is not accessed by the authorized users and any activity running on the honeypot, it would be the hacker’s activities, The honeypot attracts the hackers’ attention with fake ports (Mohammed & Rehma, 2016).

Can hackers tell that you have a honeypot running?

Yes, highly skilled and professional hackers may have the ability to know that a honeypot is running based on a number of honeypot responses to them. According to Innes and Valli (2006), the weakness of a honeypot can lead hackers to know if they are on a running honeypot. One of the weaknesses is that the input and output backdoor that the developer of the honeypot left may allow the configuration to be changed and this might result in the loss of the honeypot efficiency.

Do they have honeypots for spammers to keep them from harvesting emails from your webpages?

Spam is one of those things that information technology professional wishes it did not exist. It is a source of annoying without useful purpose (Mzarate, 2014). Basically, there are honeypots for spam to keep attackers away. It’s in contradiction of law and regulation to harvest e-mails from a webpage. Therefore, Security professionals started to use different electronic mail code to stop harvesting programs. So, they are posting it as “Abdullah dot Qhtani at company dot com” In place of posting the clear e-mail address

Do you think law enforcement agencies (e.g., CIA, FBI, NSA, etc.) in the United States run honeypots to track criminal behaviour?

Yes, law enforcement agencies would use the honeypot to trap and track criminals as well as they use an intrusion detection system to detect abnormal behaviors. Such agencies are hiring highly skilled IT professionals with the huge budget to track closely any expected act against the government computers. In addition, they are specifically watching certain blocks of Internet protocols as they are suspected to start malicious attacks.

Hands on Honeypot

The simulation provided support to understand how the honeypot works and the features out of it. Moreover, it will record all IP addresses along with the ports being scanned on the computer. Additionally, in the first figure (number of sockets loaded), which will provide an indication on how many sockets. Furthermore, in the second figure (fake FTP server by Honeypot), which is being recorded to monitor the honeypot activities. In the third figure (log entry), which shows the first and last names used to access to the file transfer protocol (FTP). 

 
"Not answered?"
Get the Answer