2020
DOI: 10.28925/2663-4023.2020.10.8897
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Use of Software Baits (Honeypots) as a Means of Ensuring Information Security

Abstract: This article analyses the usage of software baits as an information security asset. They provided close research about honeypot types, their advantages and disadvantages, possible security breaches, configuration and overall system effectiveness. Often, the entire electronic business of the organization is at stake, and even with the most reliable system of protection, a one-hundred-per cent guarantee of invulnerability of internal company data will not be given in principle. Depending on the goals pursued by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Honeypot can be a full-fledged operating system that emulates an employee's workplace or server, or a separate service. Understanding the abilities of intruders is important for building a protection system that can detect them [16,17].…”
Section: Issues Of Using Decoys and Snags To Protect Data In Computer...mentioning
confidence: 99%
“…Honeypot can be a full-fledged operating system that emulates an employee's workplace or server, or a separate service. Understanding the abilities of intruders is important for building a protection system that can detect them [16,17].…”
Section: Issues Of Using Decoys and Snags To Protect Data In Computer...mentioning
confidence: 99%